2021-10-14 18:32:17 +02:00
---
2021-10-22 16:49:59 +02:00
Name : Procdump(64).exe
2021-10-14 18:32:17 +02:00
Description : SysInternals Memory Dump Tool
Author : 'Alfie Champion (@ajpc500)'
Created : '2020-10-14'
Commands :
- Command : procdump.exe -md calc.dll explorer.exe
Description : Loads calc.dll where DLL is configured with a 'MiniDumpCallbackRoutine' exported function. Valid process must be provided as dump still created.
Usecase : Performs execution of unsigned DLL.
Category : Execute
Privileges : User
MitreID : T1202
MitreLink : https://attack.mitre.org/techniques/T1202
OperatingSystem : Windows 8.1 and higher, Windows Server 2012 and higher.
- Command : procdump.exe -md calc.dll foobar
Description : Loads calc.dll where configured with DLL_PROCESS_ATTACH execution, process argument can be arbitrary.
Usecase : Performs execution of unsigned DLL.
Category : Execute
Privileges : User
MitreID : T1202
MitreLink : https://attack.mitre.org/techniques/T1202
OperatingSystem : Windows 8.1 and higher, Windows Server 2012 and higher.
Detection :
- IOC : Process creation with given '-md' parameter
- IOC : Anomalous child processes of procdump
- IOC : Unsigned DLL load via procdump.exe or procdump64.exe
Resources :
- Link : https://twitter.com/ajpc500/status/1448588362382778372?s=20
---