T1003.002 Security Account Manager
Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the net user
command. Enumerating the SAM database requires SYSTEM level access.
A number of tools can be used to retrieve the SAM file through in-memory techniques:
Alternatively, the SAM can be extracted from the Registry with Reg:
reg save HKLM\sam sam
reg save HKLM\system system
Creddump7 can then be used to process the SAM database locally to retrieve hashes.1
Notes:
- RID 500 account is the local, built-in administrator.
- RID 501 is the guest account.
- User accounts start with a RID of 1,000+.
Item | Value |
---|---|
ID | T1003.002 |
Sub-techniques | T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008 |
Tactics | TA0006 |
Platforms | Windows |
Version | 1.0 |
Created | 11 February 2020 |
Last Modified | 15 June 2022 |
Procedure Examples
ID | Name | Description |
---|---|---|
C0017 | C0017 | During C0017, APT41 copied the SAM and SYSTEM Registry hives for credential harvesting.30 |
S0154 | Cobalt Strike | Cobalt Strike can recover hashed passwords.14 |
S0050 | CosmicDuke | CosmicDuke collects Windows account hashes.15 |
S0046 | CozyCar | Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication.20 |
S0488 | CrackMapExec | CrackMapExec can dump usernames and hashed passwords from the SAM.12 |
G0035 | Dragonfly | Dragonfly has dropped and executed SecretsDump to dump password hashes.24 |
S0120 | Fgdump | Fgdump can dump Windows password hashes.5 |
G0093 | GALLIUM | GALLIUM used reg commands to dump specific hives from the Windows Registry, such as the SAM hive, and obtain password hashes.29 |
S0008 | gsecdump | gsecdump can dump Windows password hashes from the SAM.6 |
S0376 | HOPLIGHT | HOPLIGHT has the capability to harvest credentials and passwords from the SAM database.19 |
S1022 | IceApple | IceApple‘s Credential Dumper module can dump encrypted password hashes from SAM registry keys, including HKLM\SAM\SAM\Domains\Account\F and HKLM\SAM\SAM\Domains\Account\Users\*\V .18 |
S0357 | Impacket | SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.4 |
G0004 | Ke3chang | Ke3chang has dumped credentials, including by using gsecdump.2526 |
S0250 | Koadic | Koadic can gather hashed passwords by dumping SAM/SECURITY hive.3 |
G0045 | menuPass | menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.2728 |
S0002 | Mimikatz | Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from the SAM table.78910 |
S0080 | Mivast | Mivast has the capability to gather NTLM password information.13 |
C0002 | Night Dragon | During Night Dragon, threat actors dumped account hashes using gsecdump.31 |
C0012 | Operation CuckooBees | During Operation CuckooBees, the threat actors leveraged a custom tool to dump OS credentials and used following commands: reg save HKLM\\SYSTEM system.hiv , reg save HKLM\\SAM sam.hiv , and reg save HKLM\\SECURITY security.hiv , to dump SAM, SYSTEM and SECURITY hives.32 |
S0371 | POWERTON | POWERTON has the ability to dump password hashes.17 |
S0006 | pwdump | pwdump can be used to dump credentials from the SAM.11 |
S0125 | Remsec | Remsec can dump the SAM database.16 |
G0027 | Threat Group-3390 | Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.2122 |
G0102 | Wizard Spider | Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.23 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1028 | Operating System Configuration | Consider disabling or restricting NTLM.2 |
M1027 | Password Policies | Ensure that local administrator accounts have complex, unique passwords across all systems on the network. |
M1026 | Privileged Account Management | Do not put user or admin domain accounts in the local administrator groups across systems unless they are tightly controlled, as this is often equivalent to having a local administrator account with the same password on all systems. Follow best practices for design and administration of an enterprise network to limit privileged account use across administrative tiers. |
M1017 | User Training | Limit credential overlap across accounts and systems by training users and administrators not to use the same password for multiple accounts. |
Detection
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0022 | File | File Access |
DS0024 | Windows Registry | Windows Registry Key Access |
References
-
Flathers, R. (2018, February 19). creddump7. Retrieved April 11, 2018. ↩
-
Microsoft. (2012, November 29). Using security policies to restrict NTLM traffic. Retrieved December 4, 2017. ↩
-
Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018. ↩
-
Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. ↩
-
TrueSec. (n.d.). gsecdump v2.0b5. Retrieved September 29, 2015. ↩
-
Deply, B., Le Toux, V. (2016, June 5). module ~ lsadump. Retrieved August 7, 2017. ↩
-
Grafnetter, M. (2015, October 26). Retrieving DPAPI Backup Keys from Active Directory. Retrieved December 19, 2017. ↩
-
The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019. ↩
-
Wikipedia. (2007, August 9). pwdump. Retrieved June 22, 2016. ↩
-
byt3bl33d3r. (2018, September 8). SMB: Command Reference. Retrieved July 17, 2020. ↩
-
Stama, D.. (2015, February 6). Backdoor.Mivast. Retrieved February 15, 2016. ↩
-
Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017. ↩
-
F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015. ↩
-
Kaspersky Lab’s Global Research & Analysis Team. (2016, August 9). The ProjectSauron APT. Technical Analysis. Retrieved August 17, 2016. ↩
-
Ackerman, G., et al. (2018, December 21). OVERRULED: Containing a Potentially Destructive Adversary. Retrieved January 17, 2019. ↩
-
CrowdStrike. (2022, May). ICEAPPLE: A NOVEL INTERNET INFORMATION SERVICES (IIS) POST-EXPLOITATION FRAMEWORK. Retrieved June 27, 2022. ↩
-
US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019. ↩
-
F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015. ↩
-
Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018. ↩
-
Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017. ↩
-
Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020. ↩
-
US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018. ↩
-
Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014. ↩
-
Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018. ↩
-
PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017. ↩
-
Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved June 29, 2017. ↩
-
Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019. ↩
-
Rufus Brown, Van Ta, Douglas Bienstock, Geoff Ackerman, John Wolfram. (2022, March 8). Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments. Retrieved July 8, 2022. ↩
-
McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018. ↩
-
Cybereason Nocturnus. (2022, May 4). Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques. Retrieved September 22, 2022. ↩