← Back to SOC feed Coverage →

Cred Dump Tools Dropped Files

sigma HIGH SigmaHQ
T1003.001T1003.002T1003.003T1003.004T1003.005
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may be dropping credential dump tools to exfiltrate sensitive account credentials from compromised systems. SOC teams should proactively hunt for these files in Azure Sentinel to detect potential credential theft and limit lateral movement within the network.

Detection Rule

Sigma (Original)

title: Cred Dump Tools Dropped Files
id: 8fbf3271-1ef6-4e94-8210-03c2317947f6
status: test
description: Files with well-known filenames (parts of credential dump software or files produced by them) creation
references:
    - https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Teymur Kheirkhabarov, oscd.community
date: 2019-11-01
modified: 2025-10-25
tags:
    - attack.credential-access
    - attack.t1003.001
    - attack.t1003.002
    - attack.t1003.003
    - attack.t1003.004
    - attack.t1003.005
logsource:
    category: file_event
    product: windows
detection:
    selection:
        - TargetFilename|contains:
              - '\fgdump-log'
              - '\kirbi'
              - '\pwdump'
              - '\pwhashes'
              - '\wce_ccache'
              - '\wce_krbtkts'
        - TargetFilename|endswith:
              - '\cachedump.exe'
              - '\cachedump64.exe'
              - '\DumpExt.dll'
              - '\DumpSvc.exe'
              - '\Dumpy.exe'
              - '\fgexec.exe'
              - '\lsremora.dll'
              - '\lsremora64.dll'
              - '\NTDS.out'
              - '\procdump.exe'
              - '\procdump64.exe'
              - '\procdump64a.exe'
              - '\pstgdump.exe'
              - '\pwdump.exe'
              - '\SAM.out'
              - '\SECURITY.out'
              - '\servpw.exe'
              - '\servpw64.exe'
              - '\SYSTEM.out'
              - '\test.pwd'
              - '\wceaux.dll'
    condition: selection
falsepositives:
    - Legitimate Administrator using tool for password recovery
level: high
regression_tests_path: regression_data/rules/windows/file/file_event/file_event_win_cred_dump_tools_dropped_files/info.yml

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName contains "\\fgdump-log" or TargetFileName contains "\\kirbi" or TargetFileName contains "\\pwdump" or TargetFileName contains "\\pwhashes" or TargetFileName contains "\\wce_ccache" or TargetFileName contains "\\wce_krbtkts") or (TargetFileName endswith "\\cachedump.exe" or TargetFileName endswith "\\cachedump64.exe" or TargetFileName endswith "\\DumpExt.dll" or TargetFileName endswith "\\DumpSvc.exe" or TargetFileName endswith "\\Dumpy.exe" or TargetFileName endswith "\\fgexec.exe" or TargetFileName endswith "\\lsremora.dll" or TargetFileName endswith "\\lsremora64.dll" or TargetFileName endswith "\\NTDS.out" or TargetFileName endswith "\\procdump.exe" or TargetFileName endswith "\\procdump64.exe" or TargetFileName endswith "\\procdump64a.exe" or TargetFileName endswith "\\pstgdump.exe" or TargetFileName endswith "\\pwdump.exe" or TargetFileName endswith "\\SAM.out" or TargetFileName endswith "\\SECURITY.out" or TargetFileName endswith "\\servpw.exe" or TargetFileName endswith "\\servpw64.exe" or TargetFileName endswith "\\SYSTEM.out" or TargetFileName endswith "\\test.pwd" or TargetFileName endswith "\\wceaux.dll")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_cred_dump_tools_dropped_files.yml