a6582351b5
* [New Rule] Potential Remote Credential Access via Registry 4624 logon followed by hive file creation by regsvc svchost.exe by same user.name and host.id. This matches on secretdsdump and other similar implementations. require to correlation Elastic endpoint file events with System integration logs (4624). Example of data : * Delete workspace.xml * Update credential_access_remote_sam_secretsdump.toml * Update credential_access_remote_sam_secretsdump.toml * add non ecs field * Update non-ecs-schema.json * Update credential_access_remote_sam_secretsdump.toml * Update rules/windows/credential_access_remote_sam_secretsdump.toml Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com> * Update rules/windows/credential_access_remote_sam_secretsdump.toml Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com> * Update rules/windows/credential_access_remote_sam_secretsdump.toml Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com> Co-authored-by: Jonhnathan <jonhnathancesar@gmail.com> Co-authored-by: Justin Ibarra <brokensound77@users.noreply.github.com>