Skip to content
Threat Feed
high advisory

Unsecured Outlook Credentials Access in Windows Registry

An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.

Attackers may attempt to access unsecured Outlook credentials stored within the Windows registry to compromise user email accounts. This involves leveraging tools or scripts to directly read sensitive registry keys containing password or authentication information. This activity often occurs after initial access has been gained through phishing, exploitation of vulnerabilities, or other means. Successful compromise of Outlook credentials can lead to significant data breaches, financial losses, and reputational damage. The credential access activity is detected via Windows Security Event logs, specifically Event ID 4663, focusing on registry paths associated with Outlook profiles. Multiple stealers and keyloggers have been observed utilizing this technique.

Attack Chain

  1. Initial access is gained via phishing, exploiting vulnerabilities, or other methods.
  2. The attacker executes a malicious process (e.g., Snake Keylogger) on the compromised system.
  3. The malicious process attempts to access the Windows registry using standard Windows APIs.
  4. The process targets specific registry paths where Outlook stores profile information: *\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676* and *\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676*.
  5. Windows Security Event logging generates Event ID 4663 when the registry object is accessed.
  6. The attacker extracts the unsecured Outlook credentials from the registry.
  7. The attacker uses the stolen credentials to access the victim’s Outlook account.
  8. The attacker exfiltrates sensitive information, sends malicious emails, or performs other unauthorized actions.

Impact

Compromised Outlook credentials can lead to unauthorized access to email accounts, enabling attackers to steal sensitive information, impersonate users, and conduct further malicious activities. This can result in significant financial losses, data breaches, and reputational damage. The impact ranges from individual user compromise to enterprise-wide breaches depending on the scope of the attack. Threat actors may use compromised accounts to launch further attacks, potentially impacting other systems and data.

Recommendation

  • Enable “Audit Object Access” in Group Policy for Windows Security Event logs to track Event ID 4663 (per the “how_to_implement” section) and monitor registry access.
  • Deploy the Sigma rule Detect Suspicious Outlook Registry Access to identify unauthorized processes accessing Outlook credential registry paths.
  • Investigate any alerts generated by the Sigma rule Detect Suspicious Outlook Registry Access to determine if credential theft occurred.
  • Monitor for processes other than outlook.exe accessing the specific registry paths outlined in the search field to identify potentially malicious activity.

Detection coverage 2

Detect Suspicious Outlook Registry Access

high

Detects processes other than Outlook accessing registry keys associated with Outlook profile information, potentially indicating credential theft.

sigma tactics: credential_access techniques: T1552 sources: registry_event, windows

Suspicious Process Accessing Outlook Profile Registry (Process Creation)

high

Detects creation of process accessing outlook profile registry path

sigma tactics: credential_access techniques: T1552 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →