For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-3vo.md. A documentation index is available at /llms.txt.

Credential access via registry hive dumping

This rule is part of a beta feature. To learn more, contact Support.

Goal

Detect when a registry hive is dumped.

Strategy

Command line utilities like reg.exe can be used to dump Security and/or SAM hives. Attackers have dumped these hives in an attempt to extract credentials.

Triage and response

  1. Identify which hive is being dumped, and if it is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.