226. That's How Adversaries Extract Credentials From Registry

Hello everyone!

Let's look at another technique I don't see to be used ITW often. This time it's OS Credential Dumping: LSA Secrets (T1003.004). And I do it rarely, but we'll look into the same report.

The adversary leveraged multiple commands to extract credentials, including the following:

cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets\\_SC_MSSQLSERVER\\CurrVal > C:\\Windows\\Temp\\KQPGjxdB.tmp 2>&1 

cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets\\_SC_MSSQLSERVER > C:\\Windows\\Temp\\AVFVmJxu.tmp 2>&1 

cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets > C:\\Windows\\Temp\\UHopbQrR.tmp 2>&1 

Yes, the adversary abused reg.exe to extract LSA secrets from registry. So, we can hunt for similar behavior:

event_type: "processcreatewin"

AND

proc_file_path: "reg.exe"

AND

cmdline: "Security\\Policy\\Secrets"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge