226. That's How Adversaries Extract Credentials From Registry
Hello everyone!
Let's look at another technique I don't see to be used ITW often. This time it's OS Credential Dumping: LSA Secrets (T1003.004). And I do it rarely, but we'll look into the same report.
The adversary leveraged multiple commands to extract credentials, including the following:
cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets\\_SC_MSSQLSERVER\\CurrVal > C:\\Windows\\Temp\\KQPGjxdB.tmp 2>&1
cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets\\_SC_MSSQLSERVER > C:\\Windows\\Temp\\AVFVmJxu.tmp 2>&1
cmd.exe /C reg query HKLM\\Security\\Policy\\Secrets > C:\\Windows\\Temp\\UHopbQrR.tmp 2>&1
Yes, the adversary abused reg.exe to extract LSA secrets from registry. So, we can hunt for similar behavior:
event_type: "processcreatewin"
AND
proc_file_path: "reg.exe"
AND
cmdline: "Security\\Policy\\Secrets"
See you tomorrow!
Comments
Post a Comment