SAM Registry Hive
WindowsAuthentication & AccessDisk Image
Location
C:\Windows\System32\config\SAMDescription
Security Accounts Manager hive containing local user accounts, group memberships, password policy settings, and NTLM password hashes.
Forensic Value
Enumerating local accounts reveals rogue admin accounts created for persistence. Comparing last password change timestamps against known compromise windows identifies accounts likely tampered with by adversaries. Extracted NTLM hashes (with SYSTEM hive as decryption key) confirm whether pass-the-hash was feasible.
Tools Required
KAPERegRipperImpacket secretsdumpRegistry Explorer (Eric Zimmerman)
Collection Commands
KAPE
kape.exe --tsource C: --tdest C:\output --target RegistryHives
reg.exe
reg save HKLM\SAM C:\output\SAM.hiv
Impacket
python3 secretsdump.py -sam SAM.hiv -system SYSTEM.hiv LOCAL
RegRipper
rip.exe -r C:\output\SAM.hiv -p samparse
Collection Constraints
- •Availability, retention, and field coverage depend on the Windows release, SKU, per-host audit policy, and user activity. Treat absence as inconclusive unless you verified the feature was enabled.
MITRE ATT&CK Techniques
T1003.002T1136.001T1078.003