<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Registry-Dump — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/registry-dump/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 24 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/registry-dump/feed.xml" rel="self" type="application/rss+xml"/><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item></channel></rss>