DefaultUser And Password added In Registry

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

DefaultUser And Password added In Registry

Standard

Sysmon, Windows

Persistence: Modify Registry (T1112)

Defense Evasion: Modify Registry (T1112)

Credential Access: Unsecured Credentials - Credentials in Registry (T1552.002)

Trouble

About the rule

Rule Type

Standard

Rule Description

Detects storage of default username and password in the Windows registry, exposing plaintext credentials for reuse or lateral movement.

Why this rule?

Storing default usernames and passwords in the Windows registry represents one of the most severe credential management vulnerabilities, as it exposes plaintext or weakly encoded credentials that attackers can extract through simple registry queries, memory dumps, or automated credential harvesting tools without requiring complex exploitation techniques. Attackers who discover these stored credentials gain immediate access to user accounts, can perform lateral movement across networks using stolen credentials, establish persistent access through credential reuse, and potentially escalate privileges if administrative credentials are stored. This misconfiguration violates fundamental security principles, fails compliance audits (PCI-DSS explicitly prohibits storing plaintext credentials), and provides attackers with an easy path from initial compromise to full domain control when combined with privileged account credentials stored in the same location.

Severity

Trouble

Rule journey

Attack chain scenario

Credential Access, Persistence → Registry Modification → Plaintext Credentials Stored → Credential Theft → Lateral Movement.

Impact

Plaintext credentials stored in registry enable credential theft and potential lateral movement across the network.

Rule Requirement

Prerequisites

Enable registry auditing or Sysmon Event ID 13 (Registry value modification).

Criteria

Action1: actionname = "Registry Event" AND (( OBJECTNAME contains "Microsoft\Windows NT\CurrentVersion\Winlogon" ) AND ( OBJECTNAME endswith "DefaultUserName" OR OBJECTVALUENAME = "DefaultUserName" OR OBJECTNAME endswith "DefaultPassword" OR OBJECTVALUENAME = "DefaultPassword" )) select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.OBJECTNAME,Action1.OBJECTVALUENAME,Action1.ACCESSES,Action1.USERNAME,Action1.DOMAIN,Action1.PREVVAL,Action1.CHANGES,Action1.INFORMATION

Detection

Execution Mode

realtime

Log Sources

Windows

MITRE ATT&CK

Persistence: Modify Registry (T1112) Defense Evasion: Modify Registry (T1112) Credential Access: Unsecured Credentials - Credentials in Registry (T1552.002)

Future actions

Known False Positives

IT Admin might perform this action legitimately, recommended to add filter as required based on your environment.

Next Steps

  1. Identification: Identify which credentials were stored in the registry.
  2. Analysis: Determine if this configuration was authorized or malicious.
  3. Response: Remove plaintext credentials from registry and rotate affected passwords.

Mitigation

ID

Mitigation

Description

M1047

Audit

Proactively search for credentials within the Registry and attempt to remediate the risk.

M1027

Password Policies

Do not store credentials within the Registry.

M1026

Privileged Account Management

If it is necessary that software must store credentials in the Registry, then ensure the associated accounts have limited permissions so they cannot be abused if obtained by an adversary.

M1024

Restrict Registry Permissions

Ensure proper permissions are set for Registry hives to prevent users from modifying keys for system components that may lead to privilege escalation.