heroui logo

SysKey Registry Keys Access

Sigma Rules

View Source
Summary
This detection rule aims to identify unauthorized access attempts to specific Windows Registry keys that are associated with the SysKey encryption mechanism. SysKey was a feature in older versions of Windows that provided an additional layer of encryption for the Security Accounts Manager (SAM) database. The rule listens for events generated by the Windows Security log, specifically Event IDs 4656 and 4663, which indicate attempts to open a registry key and the access attempts. The keys monitored include 'lsa\JD', 'lsa\GBG', 'lsa\Skew1', and 'lsa\Data', which are critical for SysKey operations. By targeting these keys, the rule helps in detecting potential misuse or abuse of the SysKey mechanism, which could suggest an attempt to compromise sensitive account data.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
Created: 2019-08-12