Credential access via registry hive dumping

This rule is part of a beta feature. To learn more, contact Support.

Set up the sentinelone integration.

Goal

Detect when a registry hive is dumped.

Strategy

Command line utilities like reg.exe can be used to dump Security and/or SAM hives. Attackers have dumped these hives in an attempt to extract credentials.

Triage and response

  1. Identify which hive is being dumped, and if it is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.