mirror of
https://github.com/socfortress/Wazuh-Rules.git
synced 2025-11-02 12:53:15 +00:00
27 lines
881 B
YAML
27 lines
881 B
YAML
title: Registry Dump of SAM Creds and Secrets
|
|
id: 038cd51c-3ad8-41c5-ba8f-5d1c92f3cc1e
|
|
status: experimental
|
|
description: Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through Windows Registry where the SAM database is stored
|
|
author: frack113
|
|
references:
|
|
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.002/T1003.002.md#atomic-test-1---registry-dump-of-sam-creds-and-secrets
|
|
date: 2022/01/05
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection_reg:
|
|
CommandLine|contains: ' save '
|
|
selection_key:
|
|
CommandLine|contains:
|
|
- HKLM\sam
|
|
- HKLM\system
|
|
- HKLM\security
|
|
condition: all of selection_*
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|
|
tags:
|
|
- attack.credential_access
|
|
- attack.t1003.002
|