Potential SAM Database Dump

Detects the creation of files that look like exports of the local SAM (Security Account Manager)

Sigma rule (View on GitHub)

 1title: Potential SAM Database Dump
 2id: 4e87b8e2-2ee9-4b2a-a715-4727d297ece0
 3status: test
 4description: Detects the creation of files that look like exports of the local SAM (Security Account Manager)
 5references:
 6    - https://github.com/search?q=CVE-2021-36934
 7    - https://github.com/cube0x0/CVE-2021-36934
 8    - https://www.google.com/search?q=%22reg.exe+save%22+sam
 9    - https://github.com/HuskyHacks/ShadowSteal
10    - https://github.com/FireFart/hivenightmare
11author: Florian Roth (Nextron Systems)
12date: 2022/02/11
13modified: 2023/01/05
14tags:
15    - attack.credential_access
16    - attack.t1003.002
17logsource:
18    product: windows
19    category: file_event
20detection:
21    selection:
22        - TargetFilename|endswith:
23              - '\Temp\sam'
24              - '\sam.sav'
25              - '\Intel\sam'
26              - '\sam.hive'
27              - '\Perflogs\sam'
28              - '\ProgramData\sam'
29              - '\Users\Public\sam'
30              - '\AppData\Local\sam'
31              - '\AppData\Roaming\sam'
32              - '_ShadowSteal.zip'       # https://github.com/HuskyHacks/ShadowSteal
33              - '\Documents\SAM.export'  # https://github.com/n3tsurge/CVE-2021-36934/
34              - ':\sam'
35        - TargetFilename|contains:
36              - '\hive_sam_'             # https://github.com/FireFart/hivenightmare
37              - '\sam.save'
38              - '\sam.export'
39              - '\~reg_sam.save'
40              - '\sam_backup'
41              - '\sam.bck'
42              - '\sam.backup'
43    condition: selection
44falsepositives:
45    - Rare cases of administrative activity
46level: high

References

Related rules

to-top