SAM SECURITY Hive Dump Possible Credential Theft

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects attempts to export a registry hive which may contain credentials using the Windows reg.exe tool by an insider.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Process started" AND ((COMMANDLINE contains "save" OR COMMANDLINE contains "export") AND (COMMANDLINE contains "hklm\sam" OR COMMANDLINE contains "hklm\system" OR COMMANDLINE contains "hklm\security" OR COMMANDLINE contains "hklm\\sam" OR COMMANDLINE contains "hklm\\system" OR COMMANDLINE contains "hklm\\security") AND (PROCESSNAME endswith "reg.exe" OR ORIGINALFILENAME contains "reg")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows