cscli scenarios install sigmahq/proc_creation_win_dump64_defender_av_bypass_rename
1type: trigger2name: sigmahq/proc_creation_win_dump64_defender_av_bypass_rename3description: |4 Detects when a user is potentially trying to bypass the Windows Defender AV by renaming a tool to dump64.exe and placing it in the Visual Studio folder. Currently the rule is covering only usage of procdump but other utilities can be added in order to increase coverage.5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && (evt.Parsed.Image startsWith ':\\Program Files' && evt.Parsed.Image contains '\\Microsoft Visual Studio\\' && evt.Parsed.Image endsWith '\\dump64.exe' && (evt.Parsed.OriginalFileName == 'procdump' || evt.Parsed.CommandLine contains ' -ma ' || evt.Parsed.CommandLine contains ' -mp '))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t1003.0011516 label: "Potential Windows Defender AV Bypass Via Dump64.EXE Rename"17 behavior : "windows:audit"18 remediation: false1920scope:21 type: ParentProcessId22 expression: evt.Parsed.ParentProcessId2324