T1552.002 REGISTRYPasswordDumping
T1552.002 - REGISTRY Password Dumping¶
DESCRIPTION¶
Detects scanning of registry hives for the value password. Adversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs or services
Example:
reg query HKLM /f password /t REG_SZ /s\ reg query HKCU /f password /t REG_SZ /s
Related
Agent Tesla, TrickBot, APT32, others
Reference:
https://github.com/SigmaHQ/sigma/blob/cf29e28a54daa9d52f7d1a5996f023e2d08cde84/rules/windows/process_creation/proc_creation_win_reg_enumeration_for_credentials_in_registry.yml#L9
ATT&CK TACTICS¶
T1552.002 - Unsecured Credentials: Credentials in Registry
Data Source(s): Command, Windows Registry
SENTINEL RULE QUERY¶
Triage¶
- Inspect if the activity is expected and performed by an admin or a service
VERSION¶
Version 1.0 (date: 10/07/2023)