--- Name: Procdump(64).exe Description: SysInternals Memory Dump Tool Author: 'Alfie Champion (@ajpc500)' Created: '2020-10-14' Commands: - Command: procdump.exe -md calc.dll explorer.exe Description: Loads calc.dll where DLL is configured with a 'MiniDumpCallbackRoutine' exported function. Valid process must be provided as dump still created. Usecase: Performs execution of unsigned DLL. Category: Execute Privileges: User MitreID: T1202 MitreLink: https://attack.mitre.org/techniques/T1202 OperatingSystem: Windows 8.1 and higher, Windows Server 2012 and higher. - Command: procdump.exe -md calc.dll foobar Description: Loads calc.dll where configured with DLL_PROCESS_ATTACH execution, process argument can be arbitrary. Usecase: Performs execution of unsigned DLL. Category: Execute Privileges: User MitreID: T1202 MitreLink: https://attack.mitre.org/techniques/T1202 OperatingSystem: Windows 8.1 and higher, Windows Server 2012 and higher. Detection: - IOC: Process creation with given '-md' parameter - IOC: Anomalous child processes of procdump - IOC: Unsigned DLL load via procdump.exe or procdump64.exe Resources: - Link: https://twitter.com/ajpc500/status/1448588362382778372?s=20 ---