Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: Potential SAM hive dumping
name: Registry access to SAM database
id: 2f326557-0291-4eb1-a87a-7a17b7d941cb
version: 1.0.8
version: 2.0.0
description:
Identifies access to the Security Account Manager registry hives.
labels:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
name: Potential LSA secrets registry dumping
name: Suspicious LSA secrets registry access
id: e5e95cbe-c8ab-418c-abe3-539d70a0b0af
version: 1.0.0
version: 2.0.0
description: |
Identifies potential dumping of LSA secrets by suspicious processes that access
sensitive SECURITY registry hives associated with cached credentials and LSA secret
storage.
Identifies access to LSA secrets by suspicious processes that access sensitive
SECURITY registry hives associated with cached credentials and LSA secrets storage.

This behavior is commonly observed in credential dumping utilities attempting to
extract plaintext secrets, service credentials, or cached domain credentials from
the Local Security Authority.
Expand Down
Loading