← Back to SOC feed Coverage →

LSASS Process Memory Dump Creation Via Taskmgr.EXE

sigma HIGH SigmaHQ
T1003.001
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may use Taskmgr.exe to create a memory dump of the LSASS process to exfiltrate credentials. SOC teams should proactively hunt for this behavior in Azure Sentinel as it indicates potential credential theft and lateral movement attempts.

Detection Rule

Sigma (Original)

title: LSASS Process Memory Dump Creation Via Taskmgr.EXE
id: 69ca12af-119d-44ed-b50f-a47af0ebc364
status: test
description: Detects the creation of an "lsass.dmp" file by the taskmgr process. This indicates a manual dumping of the LSASS.exe process memory using Windows Task Manager.
author: Swachchhanda Shrawan Poudel
date: 2023-10-19
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/987e3ca988ae3cff4b9f6e388c139c05bf44bbb8/atomics/T1003.001/T1003.001.md#L1
tags:
    - attack.credential-access
    - attack.t1003.001
logsource:
    category: file_event
    product: windows
detection:
    selection:
        Image|endswith:
            - ':\Windows\system32\taskmgr.exe'
            - ':\Windows\SysWOW64\taskmgr.exe'
        TargetFilename|contains|all:
            - '\AppData\Local\Temp\'
            - '\lsass'
            - '.DMP'
    condition: selection
falsepositives:
    - Rare case of troubleshooting by an administrator or support that has to be investigated regardless
level: high
regression_tests_path: regression_data/rules/windows/file/file_event/file_event_win_taskmgr_lsass_dump/info.yml

KQL (Azure Sentinel)

imFileEvent
| where (TargetFilePath endswith ":\\Windows\\system32\\taskmgr.exe" or TargetFilePath endswith ":\\Windows\\SysWOW64\\taskmgr.exe") and (TargetFileName contains "\\AppData\\Local\\Temp\\" and TargetFileName contains "\\lsass" and TargetFileName contains ".DMP")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_taskmgr_lsass_dump.yml