heroui logo

HackTool - Pypykatz Credentials Dumping Activity

Sigma Rules

View Source
Summary
This rule is designed to detect the execution of the 'pypykatz' tool, which is commonly used by attackers to extract credentials from the Windows Security Account Manager (SAM) database by querying the Windows registry. The detection rule primarily looks for process creation events where the image name ends with 'pypykatz.exe' or 'python.exe', along with a command line that contains both 'live' and 'registry'. This indicates an attempt to use the pypykatz tool to interact with the registry in order to perform credential dumping operations. The strategy behind this detection is to monitor any such legitimate tool used in a potentially malicious manner, targeting situations where an adversary could be attempting to harvest sensitive credential data from the system. False positives are possible, but are identified as 'unknown', suggesting that further contextual analysis is needed to confirm malicious intent.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1003.002
Created: 2022-01-05