ID | Name |
---|---|
T1003.001 | LSASS Memory |
T1003.002 | Security Account Manager |
T1003.003 | NTDS |
T1003.004 | LSA Secrets |
T1003.005 | Cached Domain Credentials |
T1003.006 | DCSync |
T1003.007 | Proc Filesystem |
T1003.008 | /etc/passwd and /etc/shadow |
Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the net user
command. Enumerating the SAM database requires SYSTEM level access.
A number of tools can be used to retrieve the SAM file through in-memory techniques:
Alternatively, the SAM can be extracted from the Registry with Reg:
reg save HKLM\sam sam
reg save HKLM\system system
Creddump7 can then be used to process the SAM database locally to retrieve hashes.[1]
Notes:
ID | Name | Description |
---|---|---|
G1030 | Agrius |
Agrius dumped the SAM file on victim machines to capture credentials.[2] |
G0016 | APT29 |
APT29 has used the |
G0096 | APT41 |
APT41 extracted user account data from the Security Account Managerr (SAM), making a copy of this database from the registry using the |
G1023 | APT5 |
APT5 has copied and exfiltrated the SAM Registry hive from targeted systems.[5] |
C0017 | C0017 |
During C0017, APT41 copied the |
S0154 | Cobalt Strike |
Cobalt Strike can recover hashed passwords.[7] |
S0050 | CosmicDuke |
CosmicDuke collects Windows account hashes.[8] |
S0046 | CozyCar |
Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication.[9] |
S0488 | CrackMapExec |
CrackMapExec can dump usernames and hashed passwords from the SAM.[10] |
G1034 | Daggerfly |
Daggerfly used Reg to dump the Security Account Manager (SAM) hive from victim machines for follow-on credential extraction.[11] |
G0035 | Dragonfly |
Dragonfly has dropped and executed SecretsDump to dump password hashes.[12] |
G1003 | Ember Bear |
Ember Bear acquires victim credentials by extracting registry hives such as the Security Account Manager through commands such as |
S0120 | Fgdump | |
G1016 | FIN13 |
FIN13 has extracted the SAM and SYSTEM registry hives using the |
G0093 | GALLIUM |
GALLIUM used |
S0008 | gsecdump | |
S0376 | HOPLIGHT |
HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.[19] |
S1022 | IceApple |
IceApple's Credential Dumper module can dump encrypted password hashes from SAM registry keys, including |
S0357 | Impacket |
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.[21] |
G0004 | Ke3chang |
Ke3chang has dumped credentials, including by using gsecdump.[22][23] |
S0250 | Koadic |
Koadic can gather hashed passwords by dumping SAM/SECURITY hive.[24] |
G0045 | menuPass |
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.[25][26] |
S0002 | Mimikatz |
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.[27][28][29][30] |
S0080 | Mivast |
Mivast has the capability to gather NTLM password information.[31] |
C0002 | Night Dragon |
During Night Dragon, threat actors dumped account hashes using gsecdump.[32] |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: |
S0371 | POWERTON | |
S0006 | pwdump | |
S0125 | Remsec | |
G0027 | Threat Group-3390 |
Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.[37][38] |
G0102 | Wizard Spider |
Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.[39] |
ID | Mitigation | Description |
---|---|---|
M1028 | Operating System Configuration |
Consider disabling or restricting NTLM.[40] |
M1027 | Password Policies |
Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
M1026 | Privileged Account Management |
Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers. |
M1017 | User Training |
Limit credential overlap across accounts and systems by training users and administrators not to use the same password for multiple accounts. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. Analytic 1 - Unauthorized attempts to dump SAM database through command execution.
|
DS0022 | File | File Access |
Monitor for hash dumpers opening the Security Accounts Manager (SAM) on the local file system ( Analytic 1 - Unauthorized access to SAM database.
|
File Creation |
Monitor newly constructed files being written with default names that have extracted credentials from the Security Account Manager. Analytic 1 - Creation of files with extracted SAM credentials.
|
||
DS0024 | Windows Registry | Windows Registry Key Access |
Monitor for the SAM registry key dump being created to access stored account password hashes. Some hash dumpers will open the local file system as a device and parse to the SAM table to avoid file access defenses. Others will make an in-memory copy of the SAM table before reading hashes. Detection of compromised Valid Accounts in-use by adversaries may help as well. Analytic 1 - Unauthorized registry access to SAM key.
|