Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_pypykatz.yml
T
2022-03-16 14:57:06 +01:00

27 lines
878 B
YAML

title: Registry Parse with Pypykatz
id: a29808fd-ef50-49ff-9c7a-59a9b040b404
status: experimental
description: Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through Windows Registry where the SAM database is stored
author: frack113
references:
- https://github.com/skelsec/pypykatz
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.002/T1003.002.md#atomic-test-2---registry-parse-with-pypykatz
date: 2022/01/05
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- \pypykatz.exe
- \python.exe
CommandLine|contains|all:
- live
- registry
condition: selection
falsepositives:
- Unknown
level: high
tags:
- attack.credential_access
- attack.t1003.002