27 lines
878 B
YAML
27 lines
878 B
YAML
title: Registry Parse with Pypykatz
|
|
id: a29808fd-ef50-49ff-9c7a-59a9b040b404
|
|
status: experimental
|
|
description: Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through Windows Registry where the SAM database is stored
|
|
author: frack113
|
|
references:
|
|
- https://github.com/skelsec/pypykatz
|
|
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.002/T1003.002.md#atomic-test-2---registry-parse-with-pypykatz
|
|
date: 2022/01/05
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
Image|endswith:
|
|
- \pypykatz.exe
|
|
- \python.exe
|
|
CommandLine|contains|all:
|
|
- live
|
|
- registry
|
|
condition: selection
|
|
falsepositives:
|
|
- Unknown
|
|
level: high
|
|
tags:
|
|
- attack.credential_access
|
|
- attack.t1003.002 |