Windows critical hive in suspicious location access bits cleared

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when critical registry hives containing credentials are copied to temporary locations and have their access bits cleared.

Strategy

This rule monitors Windows Kernel-General events where @evt.id is 16 when the @Event.EventData.Data.HiveName contains references to SAM or SECURITY registry hives in temporary file paths. When attackers dump credentials from Windows systems, they often copy critical registry hives like SAM and SECURITY to temporary locations to avoid file locks, then clear the access bits before extraction. This technique is commonly used by credential dumping tools to access password hashes and security secrets stored in these protected registry hives.

Triage and response

  • Examine the temporary file path containing the copied registry hive on {{host}} to determine if the files still exist and analyze their contents.
  • Check for credential dumping tool execution or suspicious process activity around the same timeframe as the hive access.
  • Review system and security logs for signs of unauthorized access or privilege escalation that may have enabled the registry hive copying.
  • Analyze network activity for potential exfiltration of credential data following the hive access.
  • Force password resets for local and domain accounts that may have been compromised through credential extraction.