Windows syskey registry keys access

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects access to Windows syskey registry keys, which could indicate attempts to extract system credentials or boot keys for offline credential theft.

Strategy

This rule monitors Windows event logs for registry access events (Event IDs 4656 or 4663) targeting specific registry keys related to the Windows syskey functionality. These registry keys store encryption information that protects credentials stored in the SAM database. Access to these keys is concerning because attackers often target them to extract the syskey/bootkey, which can then be used to decrypt password hashes from the SAM database in offline attacks.

Triage & Response

  • Identify the user account that accessed the syskey registry keys on {{host}}.
  • Determine if the access was part of authorized security testing or system maintenance.
  • Review process information associated with the registry access to identify the responsible application.
  • Check for other suspicious activities around the same timeframe, such as credential dumping tools execution or unusual file access patterns.
  • Examine file creation events for evidence of registry hive exports or credential data exfiltration.