Critical Hive In Suspicious Location Access Bits Cleared
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects events from the Kernel-General ETW indicating that the access bits of a hive with a system like hive name located in the temp directory have been reset. This occurs when an application tries to access a hive and the hive has not be recognized since the last 7 days (by default). Registry hive dumping utilities such as QuarksPwDump were seen emitting this behavior.
Severity
Trouble
Rule Requirement
Criteria
Action1:
actionname = "sa_kernal_operations" AND SOURCE = "Microsoft-Windows-Kernel-General" AND PATH contains "\Temp\SAM,\Temp\SECURITY"
select Action1.HOSTNAME,Action1.MESSAGE,Action1.HIVENAME,Action1.PATH,Action1.MODE
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Florian Roth (Nextron Systems)


