Sigma Templates
Selection of Sigma rules for use as guides or templates
description: Detects the usage of Sysinternals Tools
tags:
- attack.t1588.002
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: ' -accepteula'
condition: selection
falsepositives:
- Legitimate use of SysInternals toolsdescription: LSASS memory dump creation using operating systems utilities.
tags:
- attack.credential_access
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains: 'lsass'
TargetFilename|endswith: 'dmp'
condition: selection
fields:
- ComputerName
- TargetFilename
falsepositives:
- Admin activity
level: highLast updated
Was this helpful?

