title: Registry Parse with Pypykatz id: a29808fd-ef50-49ff-9c7a-59a9b040b404 status: experimental description: Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through Windows Registry where the SAM database is stored author: frack113 references: - https://github.com/skelsec/pypykatz - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.002/T1003.002.md#atomic-test-2---registry-parse-with-pypykatz date: 2022/01/05 logsource: category: process_creation product: windows detection: selection: Image|endswith: - \pypykatz.exe - \python.exe CommandLine|contains|all: - live - registry condition: selection falsepositives: - Unknown level: high tags: - attack.credential_access - attack.t1003.002