
Summary
The rule identifies the use of `reg.exe` for exporting Windows Registry hives, particularly targeting the `sam`, `system`, and `security` hives, which may contain sensitive credential information. This detection is crucial as it highlights potential offline credential access attacks commonly executed by attackers using untrusted processes or scripts. By leveraging telemetry from Endpoint Detection and Response (EDR) agents, the detection specifically looks for command-line executions that invoke `save` or `export` actions involving these critical registry hives. If confirmed as malicious, this activity could indicate an attempt by attackers to extract credential data, jeopardizing network security and enabling further lateral movement within the compromised environment. The implementation requires the ingestion of detailed logs from EDR, processed through Splunk Technology Add-ons, ensuring that the data is aligned with the Endpoint data model for effective analysis.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Windows Registry
- Process
ATT&CK Techniques
- T1003.002
- T1003
Created: 2025-01-15