← Back to SOC feed Coverage →

CVE-2021-36934 usage detection

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may use CVE-2021-36934 to access the HKLM registry hive to extract sensitive credentials, bypassing BitLocker encryption. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect potential credential theft and lateral movement attempts.

KQL Query

let startTime = now(-7d);
let endTime = now();
DeviceProcessEvents
| where Timestamp between (startTime..endTime)
| where ProcessCommandLine contains "HKLM"
| where AccountName != "system"

Analytic Rule Definition

id: ab0afd3c-47fc-4a82-83ad-5c92528bdf08
name: CVE-2021-36934 usage detection
description: |
  Assuming that you have a machine that is properly BitLocker'ed, then
  the machine will need to be running to extract the SAM and SYSTEM
  files.
  This first query looks for any access to the HKLM that happens via a command
  or script that is not executed by system.
  The second query looks for usage of reg or regedit by anyone who is not system.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
tactics:
- Privilege escalation
- Exploit
query: |
  let startTime = now(-7d);
  let endTime = now();
  DeviceProcessEvents
  | where Timestamp between (startTime..endTime)
  | where ProcessCommandLine contains "HKLM"
  | where AccountName != "system"

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/CVE-2021-36934 usage detection.yaml