Critical Hive In Suspicious Location Access Bits Cleared

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects events from the Kernel-General ETW indicating that the access bits of a hive with a system like hive name located in the temp directory have been reset. This occurs when an application tries to access a hive and the hive has not be recognized since the last 7 days (by default). Registry hive dumping utilities such as QuarksPwDump were seen emitting this behavior.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Kernal Operations" AND SOURCE = "Microsoft-Windows-Kernel-General" AND PATH contains "\Temp\SAM,\Temp\SECURITY" select Action1.HOSTNAME,Action1.MESSAGE,Action1.HIVENAME,Action1.PATH

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems)