Detection rules › Sigma

Potential SAM Database Dump

Severity
high
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects the creation of files that look like exports of the local SAM (Security Account Manager)

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1003.002 OS Credential Dumping: Security Account Manager

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

or:
TargetFilename|endswith: ':\sam'
TargetFilename|endswith: '\AppData\Local\sam'
TargetFilename|endswith: '\AppData\Roaming\sam'
TargetFilename|endswith: '\Documents\SAM.export'
TargetFilename|endswith: '\Intel\sam'
TargetFilename|endswith: '\Perflogs\sam'
TargetFilename|endswith: '\ProgramData\sam'
TargetFilename|endswith: '\Temp\sam'
TargetFilename|endswith: '\Users\Public\sam'
TargetFilename|endswith: '\sam.hive'
TargetFilename|endswith: '\sam.sav'
TargetFilename|endswith: _ShadowSteal.zip
TargetFilename|contains: '\hive_sam_'
TargetFilename|contains: '\sam.backup'
TargetFilename|contains: '\sam.bck'
TargetFilename|contains: '\sam.export'
TargetFilename|contains: '\sam.save'
TargetFilename|contains: '\sam_backup'
TargetFilename|contains: '\~reg_sam.save'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenameends_with
  • :\sam
  • \AppData\Local\sam
  • \AppData\Roaming\sam
  • \Documents\SAM.export
  • \Intel\sam
  • \Perflogs\sam
  • \ProgramData\sam
  • \Temp\sam
  • \Users\Public\sam
  • \sam.hive
  • \sam.sav
  • _ShadowSteal.zip
TargetFilenamematch
  • \hive_sam_ corpus 2 (sigma 2)
  • \sam.backup
  • \sam.bck
  • \sam.export
  • \sam.save
  • \sam_backup
  • \~reg_sam.save