Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
- Requires:
- XDR Agent with eXtended Threat Hunting (XTH)
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
Credential Access (TA0006) |
ATT&CK Technique |
OS Credential Dumping (T1003) |
Severity |
Low |
Description
A sensitive registry hive was extracted, which is used for accessing credentials.
Attacker's Goals
- Adversary may attempt to extract credentials from the Windows Registry
- Credentials can then be used to perform Lateral Movement and access restricted information.
Investigative actions
- Investigate the process that tried to access the registry hive.
- Investigate the actions of the user for which his credentials were stored in the registry hive.
Variations
Uncommon sensitive registry hive dump by unsigned and rare process
Synopsis
Description
A sensitive registry hive was extracted, which is used for accessing credentials.
Attacker's Goals
- Adversary may attempt to extract credentials from the Windows Registry
- Credentials can then be used to perform Lateral Movement and access restricted information.
Investigative actions
- Investigate the process that tried to access the registry hive.
- Investigate the actions of the user for which his credentials were stored in the registry hive.
Uncommon sensitive registry hive dump by injected process
Synopsis
Description
A sensitive registry hive was extracted, which is used for accessing credentials.
Attacker's Goals
- Adversary may attempt to extract credentials from the Windows Registry
- Credentials can then be used to perform Lateral Movement and access restricted information.
Investigative actions
- Investigate the process that tried to access the registry hive.
- Investigate the actions of the user for which his credentials were stored in the registry hive.
Uncommon sensitive registry hive dump by reg.exe lolbin process which was executed by rare causality process
Synopsis
Description
A sensitive registry hive was extracted, which is used for accessing credentials.
Attacker's Goals
- Adversary may attempt to extract credentials from the Windows Registry
- Credentials can then be used to perform Lateral Movement and access restricted information.
Investigative actions
- Investigate the process that tried to access the registry hive.
- Investigate the actions of the user for which his credentials were stored in the registry hive.
Uncommon sensitive registry hive dump by reg.exe lolbin process
Synopsis
Description
A sensitive registry hive was extracted, which is used for accessing credentials.
Attacker's Goals
- Adversary may attempt to extract credentials from the Windows Registry
- Credentials can then be used to perform Lateral Movement and access restricted information.
Investigative actions
- Investigate the process that tried to access the registry hive.
- Investigate the actions of the user for which his credentials were stored in the registry hive.