CG
SkillsDetecting Credential Dumping Techniques
Start Free
Back to Skills Library
Threat Detection🔴 Advanced

Detecting Credential Dumping Techniques

Detect LSASS credential dumping, SAM database extraction, and NTDS.dit theft using Sysmon Event ID 10, Windows Security logs, and SIEM correlation rules.

3 min read1 MITRE techniques

Prerequisites

  • Sysmon v14+ deployed with ProcessAccess logging (Event ID 10) for lsass.exe
  • Windows Security audit policy enabling process creation (Event ID 4688) with command line logging
  • Splunk or Elastic SIEM ingesting Sysmon and Windows Security logs
  • Python 3.8+ for log analysis

MITRE ATT&CK Coverage

T1003

Detecting Credential Dumping Techniques

Overview

Credential dumping (MITRE ATT&CK T1003) is a post-exploitation technique where adversaries extract authentication credentials from OS memory, registry hives, or domain controller databases. This guide covers detection of LSASS memory access via Sysmon Event ID 10 (ProcessAccess), SAM registry hive export via reg.exe, NTDS.dit extraction via ntdsutil/vssadmin, and comsvcs.dll MiniDump abuse. Detection rules analyze GrantedAccess bitmasks, suspicious calling processes, and known tool signatures.

Prerequisites

  • Sysmon v14+ deployed with ProcessAccess logging (Event ID 10) for lsass.exe
  • Windows Security audit policy enabling process creation (Event ID 4688) with command line logging
  • Splunk or Elastic SIEM ingesting Sysmon and Windows Security logs
  • Python 3.8+ for log analysis

Steps

  1. Configure Sysmon to log ProcessAccess events targeting lsass.exe
  2. Forward Sysmon Event ID 10 and Windows Event ID 4688 to SIEM
  3. Create detection rules for known GrantedAccess patterns (0x1010, 0x1FFFFF)
  4. Detect comsvcs.dll MiniDump and procdump.exe targeting LSASS PID
  5. Alert on reg.exe SAM/SECURITY/SYSTEM hive export commands
  6. Detect ntdsutil/vssadmin shadow copy creation for NTDS.dit theft
  7. Correlate detections with user/host context for risk scoring

Expected Output

JSON report containing detected credential dumping indicators with technique classification, severity ratings, process details, MITRE ATT&CK mapping, and Splunk/Elastic detection queries.

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection)
  • ISO 27001: A.12.4 (Logging & Monitoring)
  • NIST 800-53: SI-4 (System Monitoring), AU-6 (Audit Review)
  • NIST CSF: DE.AE (Anomalies & Events), DE.CM (Continuous Monitoring)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add detecting-credential-dumping-techniques

# Or load dynamically via MCP
grc.load_skill("detecting-credential-dumping-techniques")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add detecting-credential-dumping-techniques
// Or via MCP
grc.load_skill("detecting-credential-dumping-techniques")

Tags

credential-dumpinglsassmimikatzsysmonactive-directorywindows-securitydefense-evasion

Related Skills

Threat Detection

Detecting Golden Ticket Forgery

3m·intermediate
Threat Detection

Detecting Pass the Ticket Attacks

3m·intermediate
Red Team & Offensive Security

Conducting Domain Persistence with Dcsync

4m·intermediate
Threat Hunting

Detecting T1003 Credential Dumping with EDR

3m·intermediate
Threat Hunting

Detecting Credential Dumping with EDR

3m·advanced
Threat Detection

Detecting Living Off the Land with Lolbas

3m·intermediate

Skill Details

Domain
Threat Detection
Difficulty
advanced
Read Time
3 min
Code Examples
0
MITRE IDs
1

On This Page

OverviewPrerequisitesStepsExpected OutputVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →