Credential access via registry hive dumping

This rule is part of a beta feature. To learn more, contact Support.

Set up the sentinelone integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when a registry hive is dumped.

Strategy

Command line utilities like reg.exe can be used to dump Security and/or SAM hives. Attackers have dumped these hives in an attempt to extract credentials.

Triage and response

  1. Identify which hive is being dumped, and if it is authorized or expected.
  2. If it’s not authorized, isolate the host from the network.
  3. Follow your organization’s internal processes for investigating and remediating compromised systems.
PREVIEWING: mervebolat/span-id-preprocessing