← Back to SOC feed Coverage →

Potential SAM Database Dump

sigma HIGH SigmaHQ
T1003.002
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may be dumping the SAM database to extract local account credentials, which is a common technique used to gain persistent access. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential credential theft and mitigate lateral movement risks.

Detection Rule

Sigma (Original)

title: Potential SAM Database Dump
id: 4e87b8e2-2ee9-4b2a-a715-4727d297ece0
status: test
description: Detects the creation of files that look like exports of the local SAM (Security Account Manager)
references:
    - https://github.com/search?q=CVE-2021-36934
    - https://web.archive.org/web/20210725081645/https://github.com/cube0x0/CVE-2021-36934
    - https://www.google.com/search?q=%22reg.exe+save%22+sam
    - https://github.com/HuskyHacks/ShadowSteal
    - https://github.com/FireFart/hivenightmare
author: Florian Roth (Nextron Systems)
date: 2022-02-11
modified: 2023-01-05
tags:
    - attack.credential-access
    - attack.t1003.002
logsource:
    product: windows
    category: file_event
detection:
    selection:
        - TargetFilename|endswith:
              - '\Temp\sam'
              - '\sam.sav'
              - '\Intel\sam'
              - '\sam.hive'
              - '\Perflogs\sam'
              - '\ProgramData\sam'
              - '\Users\Public\sam'
              - '\AppData\Local\sam'
              - '\AppData\Roaming\sam'
              - '_ShadowSteal.zip'       # https://github.com/HuskyHacks/ShadowSteal
              - '\Documents\SAM.export'  # https://github.com/n3tsurge/CVE-2021-36934/
              - ':\sam'
        - TargetFilename|contains:
              - '\hive_sam_'             # https://github.com/FireFart/hivenightmare
              - '\sam.save'
              - '\sam.export'
              - '\~reg_sam.save'
              - '\sam_backup'
              - '\sam.bck'
              - '\sam.backup'
    condition: selection
falsepositives:
    - Rare cases of administrative activity
level: high

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName endswith "\\Temp\\sam" or TargetFileName endswith "\\sam.sav" or TargetFileName endswith "\\Intel\\sam" or TargetFileName endswith "\\sam.hive" or TargetFileName endswith "\\Perflogs\\sam" or TargetFileName endswith "\\ProgramData\\sam" or TargetFileName endswith "\\Users\\Public\\sam" or TargetFileName endswith "\\AppData\\Local\\sam" or TargetFileName endswith "\\AppData\\Roaming\\sam" or TargetFileName endswith "_ShadowSteal.zip" or TargetFileName endswith "\\Documents\\SAM.export" or TargetFileName endswith ":\\sam") or (TargetFileName contains "\\hive_sam_" or TargetFileName contains "\\sam.save" or TargetFileName contains "\\sam.export" or TargetFileName contains "\\~reg_sam.save" or TargetFileName contains "\\sam_backup" or TargetFileName contains "\\sam.bck" or TargetFileName contains "\\sam.backup")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_sam_dump.yml