Detecting Credential Dumping Techniques
Overview
Credential dumping (MITRE ATT&CK T1003) is a post-exploitation technique where adversaries extract authentication credentials from OS memory, registry hives, or domain controller databases. This skill covers detection of LSASS memory access via Sysmon Event ID 10 (ProcessAccess), SAM registry hive export via reg.exe, NTDS.dit extraction via ntdsutil/vssadmin, and comsvcs.dll MiniDump abuse. Detection rules analyze GrantedAccess bitmasks, suspicious calling processes, and known tool signatures.
Prerequisites
- Sysmon v14+ deployed with ProcessAccess logging (Event ID 10) for lsass.exe
- Windows Security audit policy enabling process creation (Event ID 4688) with command line logging
- Splunk or Elastic SIEM ingesting Sysmon and Windows Security logs
- Python 3.8+ for log analysis
Steps
- Configure Sysmon to log ProcessAccess events targeting lsass.exe
- Forward Sysmon Event ID 10 and Windows Event ID 4688 to SIEM
- Create detection rules for known GrantedAccess patterns (0x1010, 0x1FFFFF)
- Detect comsvcs.dll MiniDump and procdump.exe targeting LSASS PID
- Alert on reg.exe SAM/SECURITY/SYSTEM hive export commands
- Detect ntdsutil/vssadmin shadow copy creation for NTDS.dit theft
- Correlate detections with user/host context for risk scoring
Expected Output
JSON report containing detected credential dumping indicators with technique classification, severity ratings, process details, MITRE ATT&CK mapping, and Splunk/Elastic detection queries.