Skip to content

Latest commit

 

History

History
29 lines (15 loc) · 1.67 KB

raw-access-read.md

File metadata and controls

29 lines (15 loc) · 1.67 KB

Raw Access Read

Sysmon will log EventID 9 for any process trying to read straight from a storage device by bypassing any filesystem restrictions that may be imposed by it. This information is logged by Sysmon on Windows by leveraging its minifilter. This type of action is only done by drive imaging software or backup software in a normal operating environment.

On Linux this event is logged when a block device is directly accessed and eBPF is used to detect this type of action.

Attackers have been known to use this technique on Windows to copy NTDS.dit and SAM Registry Hives off host for the purpose of credential harvesting. In the case of Linux it is the raw access to the device for similar purposes too access credentials, key material and binaries of the system.

The fields for the event are:

  • RuleName: Name of rule that triggered the event

  • UtcTime: Time in UTC when event was created

  • ProcessGuid: Process GUID of the process that conducted reading operations from the drive

  • ProcessId: Process ID used by the OS to identify the process that conducted reading operations from the drive

  • Image: File path of the process that conducted reading operations from the drive

  • Device: Target device

In the case of Windows given that no process should be performing this action normally, it is best to log all instances of it or, even better, to target the NTDS.dit file on domain controllers and SAM hive file on all systems. On systems with many file modifications, slightly higher resource usage may result if monitoring is enabled for all files.

Example that captures all instances of this event

collect all