381. In Some Cases, Attackers Can Simply Export Your Passwords

Hello everyone!

Today we’ll once again talk about the Windows Registry and look at an example of the Unsecured Credentials: Credentials in Registry (T1552.002) technique.

While reading an investigation report on the CL-UNK-1068 attacks in South, Southeast, and East Asia, I once again noticed that attackers actively abused reg.exe. In particular, they frequently used the export parameter, for example:

reg export "HKEY_USERS\[%SID%]\SOFTWARE\TightVNC\Server"

reg export HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TightVNC\Server

reg export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server

In this case, the attacker exports the TightVNC configuration from the registry in order to obtain credentials. For detection, we can either use specific registry keys that contain sensitive data or proactively search for suspicious export events:

event_type: "processcreatewin"

AND

proc_file_path: "reg.exe"

AND

cmdline: "export"

See you soon!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse