cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Remix
Level 7
Report Inappropriate Content
Message 1 of 2

TiWorker.exe - "Attempt to Dump Password Hash from SAM Database"

Jump to solution

Hi,

ENS just reported an "Attempt to Dump Password Hash from SAM Database". The culprit is TiWorker.exe, which if I'm correct is a Windows OS file that relates to updates. I'm not sure if this is a false positive nor how to make that determination so any feedback would be appreciated.

See the event report below:

NT AUTHORITY\SYSTEM ran C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.3320_none_7f08a1dc21ecea2d\TiWorker.exe, which tried to access HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\LSA\JD\, violating the rule "Attempt to Dump Password Hash from SAM Database ", and was blocked. For information about how to respond to this event, see KB85494.

Analyzer / Detector
Analyzer content version10.6.0.9906
Product nameMcAfee Endpoint Security
Analyzer rule ID6143
Analyzer rule nameAttempt to Dump Password Hash from SAM Database
Product version10.7.0.1415
Feature nameExploit Prevention
 
Threat
Action takenBlock
Threat category'Registry' class or access
Threat event ID18060
Threat handledYes
Threat nameAttempt to Dump Password Hash from SAM Database
Threat severityCritical
Threat timestamp2/27/2020 9:06 AM
Threat typeExploit Prevention
 
Source
Source access time1/14/2020 9:30 AM
Source create time1/14/2020 9:30 AM
Source descriptionC:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.3320_none_7f08a1dc21ecea2d\TiWorker.exe -Embedding
Source file pathC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.14393.3320_none_7f08a1dc21ecea2d
Source file size199680
Source modify time10/10/2019 11:43 PM
Source process file hashbb4aa7d270f529bb5d9c6c16e9b42801
Source process nameTiWorker.exe
Source process signedYes
Source process signerC=US, S=WASHINGTON, L=REDMOND, O=MICROSOFT CORPORATION, CN=MICROSOFT WINDOWS
Source user nameNT AUTHORITY\SYSTEM
 
Target
Target host nameSDET-PDF
Target name 
Target pathHKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\LSA\JD\
Target signedNo
Target user nameSYSTEM
1 Solution

Accepted Solutions
patrakshar
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: TiWorker.exe - "Attempt to Dump Password Hash from SAM Database"

Jump to solution

Hi @Remix 

Thanks for posting here. This Rule is by default not enabled. Seems like you enabled it at your environment? 

it is possible that you are getting false positive. For which I would need verification from content team. Would suggest to open a ticket with us and we can take it further with the content team accordingly.

View solution in original post

1 Reply
patrakshar
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: TiWorker.exe - "Attempt to Dump Password Hash from SAM Database"

Jump to solution

Hi @Remix 

Thanks for posting here. This Rule is by default not enabled. Seems like you enabled it at your environment? 

it is possible that you are getting false positive. For which I would need verification from content team. Would suggest to open a ticket with us and we can take it further with the content team accordingly.

View solution in original post

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community