Potential SAM Database Dump
Detects the creation of files that look like exports of the local SAM (Security Account Manager)
Sigma rule (View on GitHub)
1title: Potential SAM Database Dump
2id: 4e87b8e2-2ee9-4b2a-a715-4727d297ece0
3status: test
4description: Detects the creation of files that look like exports of the local SAM (Security Account Manager)
5references:
6 - https://github.com/search?q=CVE-2021-36934
7 - https://web.archive.org/web/20210725081645/https://github.com/cube0x0/CVE-2021-36934
8 - https://www.google.com/search?q=%22reg.exe+save%22+sam
9 - https://github.com/HuskyHacks/ShadowSteal
10 - https://github.com/FireFart/hivenightmare
11author: Florian Roth (Nextron Systems)
12date: 2022-02-11
13modified: 2023-01-05
14tags:
15 - attack.credential-access
16 - attack.t1003.002
17logsource:
18 product: windows
19 category: file_event
20detection:
21 selection:
22 - TargetFilename|endswith:
23 - '\Temp\sam'
24 - '\sam.sav'
25 - '\Intel\sam'
26 - '\sam.hive'
27 - '\Perflogs\sam'
28 - '\ProgramData\sam'
29 - '\Users\Public\sam'
30 - '\AppData\Local\sam'
31 - '\AppData\Roaming\sam'
32 - '_ShadowSteal.zip' # https://github.com/HuskyHacks/ShadowSteal
33 - '\Documents\SAM.export' # https://github.com/n3tsurge/CVE-2021-36934/
34 - ':\sam'
35 - TargetFilename|contains:
36 - '\hive_sam_' # https://github.com/FireFart/hivenightmare
37 - '\sam.save'
38 - '\sam.export'
39 - '\~reg_sam.save'
40 - '\sam_backup'
41 - '\sam.bck'
42 - '\sam.backup'
43 condition: selection
44falsepositives:
45 - Rare cases of administrative activity
46level: high
References
Related rules
- Copying Sensitive Files with Credential Data
- Cred Dump Tools Dropped Files
- Credential Dumping Tools Service Execution - Security
- Credential Dumping Tools Service Execution - System
- Critical Hive In Suspicious Location Access Bits Cleared