cscli scenarios install sigmahq/proc_creation_win_dumpminitool_susp_execution
1type: trigger2name: sigmahq/proc_creation_win_dumpminitool_susp_execution3description: |4 Detects suspicious ways to use the "DumpMinitool.exe" binary5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && ((evt.Parsed.Image endsWith '\\DumpMinitool.exe' || evt.Parsed.Image endsWith '\\DumpMinitool.x86.exe' || evt.Parsed.Image endsWith '\\DumpMinitool.arm64.exe' || evt.Parsed.OriginalFileName in ['DumpMinitool.exe', 'DumpMinitool.x86.exe', 'DumpMinitool.arm64.exe']) && (not (evt.Parsed.Image contains '\\Microsoft Visual Studio\\' || evt.Parsed.Image contains '\\Extensions\\') || evt.Parsed.CommandLine contains '.txt' || (evt.Parsed.CommandLine contains ' Full' || evt.Parsed.CommandLine contains ' Mini' || evt.Parsed.CommandLine contains ' WithHeap') && not (evt.Parsed.CommandLine contains '--dumpType')))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t103615 - attack.t1003.0011617 label: "Suspicious DumpMinitool Execution"18 behavior : "windows:audit"19 remediation: false2021scope:22 type: ParentProcessId23 expression: evt.Parsed.ParentProcessId2425