- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects access requests to the Windows Security Account Manager (SAM) registry hive.
This rule monitors for Windows event ID 4656
, which records handle requests to securable objects. The query looks for handle requests specifically targeting registry keys with a path ending in SAM
as indicated in the @Event.EventData.Data.ObjectName
field.
The Windows SAM registry hive contains password hashes for local user accounts. Direct access to this registry hive is typically restricted while Windows is running to prevent credential theft. However, there are several techniques that attackers use to bypass these protections and access the SAM hive directly.
Legitimate access to the SAM hive through the registry is extremely rare during normal system operations. Windows APIs and system components typically use alternative methods to authenticate users and verify credentials. Direct SAM hive access is often associated with credential harvesting tools that extract password hashes for offline cracking or pass-the-hash attacks.
{{host}}
.{{host}}
.