Skip to content

Commit

Permalink
Create credentialdump_comsvcs.py
Browse files Browse the repository at this point in the history
Credential dumping with Comsvcs sig i.e. "rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump 624 C:\temp\lsass.dmp full"
  • Loading branch information
kevross33 authored Feb 27, 2024
1 parent 2c7a491 commit 40af186
Showing 1 changed file with 38 additions and 0 deletions.
38 changes: 38 additions & 0 deletions modules/signatures/credentialdump_comsvcs.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
# Copyright (C) 2024 Kevin Ross
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.

from lib.cuckoo.common.abstracts import Signature

class ComsvcsCredentialDump(Signature):
name = "comsvcs_credentialdump"
description = "Dumps process memory using comsvcs (likely credential dump of LSASS process)"
severity = 3
categories = ["credentials"]
authors = ["Kevin Ross"]
minimum = "1.3"
evented = True
ttps = ["T1003"] # # MITRE v6,7,8
reference = ["www.ired.team/offensive-security/credential-access-and-credential-dumping/dump-credentials-from-lsass-process-without-mimikatz"]

def run(self):
ret = False
cmdlines = self.results["behavior"]["summary"]["executed_commands"]
for cmdline in cmdlines:
lower = cmdline.lower()
if "comsvcs" in lower and "minidump" in lower:
ret = True
self.data.append({"command": cmdline})

return ret

0 comments on commit 40af186

Please sign in to comment.