• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Registry Hive Transfer over SMB

Risk Factors

An attacker with administrative privileges can leverage built-in Windows tools to dump credentials from registry hives. This technique can help an attacker access credentials, which can then be leveraged in later attacks.

Kill Chain

Exploitation

Risk Score

84

Detection diagram
Next in Exploitation: Responder HTTP Activity

Attack Background

Every Windows computer has a Windows registry, which is a collection of databases that contain configuration and application settings. Registry hives are sections of the Windows registry that can contain sensitive data, such as encryption keys, account credentials, and other secrets. An attacker can steal sensitive data from System, Security, or Security Account Manager (SAM) registry hives through various techniques. Credential dumping is a technique to export credentials. One type of credential dumping is to export entire registry hives with built-in Windows tools, such as reg.exe. The attacker can then transfer the registry hive to an attacker-controlled device where they can run offline cracking tools to retrieve passwords.

Mitigation Options

Ensure that local administrator accounts have complex, unique passwords across all systems on the network.
Limit the number of accounts with Administrator privileges

MITRE ATT&CK ID

What else can RevealX do for you?