ATT&CK coverage › Technique

OS Credential Dumping T1003

Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures. Credentials can then be used to perform Lateral Movement and access restricted information.

Events covered

18 catalog events are tagged with this technique by at least one rule.

ProviderEvent IDTitle
Sysmon1Process creation
Sysmon5Process terminated
Sysmon7Image loaded
Sysmon10ProcessAccess
Sysmon11FileCreate
Sysmon13RegistryEvent (Value Set)
Security-Auditing4656A handle to an object was requested.
Security-Auditing4662An operation was performed on an object.
Security-Auditing4663An attempt was made to access an object.
Security-Auditing4672Special privileges assigned to new logon.
Security-Auditing4688A new process has been created.
Security-Auditing4689A process has exited.
Security-Auditing4768A Kerberos authentication ticket (TGT) was requested.
Security-Auditing5136A directory service object was modified.
Security-Auditing5145A network share object was checked to see whether client can be granted desired access.
Security-Auditing5382Vault credentials were read.
Defender-DeviceProcessEvents9001000Process activity (any)
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).

Authoring guide

Patterns shared across the 46 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.

Fields filtered most (45 distinct)

The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.

FieldRulesHowSample values
Image14ends_with 10, match 3, eq 2?:\Windows\System32\lsass.exe, files1, files2, \RpcPing.exe, \svchost.exe
CommandLine13match 13, contains 2, regex_match 1-accepteula, -ma, lsass, hklm, sam
OriginalFileName8eq 8COMSVCS.DLL, \RpcPing.exe, Rubeus.exe, sc.exe, tasklist.exe
process_name4eq 3, ends_with 1lsass.exe, rundll32.exe, svchost.exe, \signal.exe, \signal-portable.exe
TargetImage4eq 3, in 1?:\WINDOWS\system32\lsass.exe, c:\Windows\system32\lsass.exe, C:\Windows\system32\lsass.exe, c:\Windows\System32\lsass.exe
EventID4eq 413, 4104, 4768, 7
ScriptBlockText4match 3, in 1ptt /ticket:, asreproast , silver /user:, Get-StorageDiagnosticInfo, -IncludeLiveDump
Properties3match 31131f6ad-9c07-11d1-f79f-00c04fc2dcd2, 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2, DS-Replication-Get-Changes-In-Filtered-Set, b7ff5a38-0818-42b0-8110-d3d154c97f24, 612cb747-c0e8-4f92-9221-fdd5f15b550d
ObjectName3ends_with 3, match 1\\Windows\\System32\\lsass.exe, \AppData\Roaming\Signal\, \config.json, \db.sqlite, \wceaux.dll
CallTrace3match 3UNKNOWN, dbghelp, dbgcore, seclogon.dll
ParentImage3ends_with 2, eq 1, match 1?:\Windows\System32\lsass.exe, \Windows\System32\lsass.exe, \bin\javaws.exe, :\Packages\Plugins\Microsoft.GuestConfiguration.Configura..., :\Program Files (x86)\Java\
FileName3in 1, eq 1, match 1procdump64.exe, procdump.exe, reg.exe
Details3ne 1, match 1, is_not_null 1, eq 1DWORD (0x00000000), :\Windows\System32\com\dmp\, :\Windows\SysWOW64\Tasks\Microsoft\Windows\SyncCenter\, \AppData\Local\Temp\, 0x00000001
TargetObject3match 2, eq 1, ends_with 1HKLM\\System\\CurrentControlSet\\Control\\SecurityProvide..., \System\CurrentControlSet\Services\WebClient\NetworkProvider, \System\CurrentControlSet\Services\RDPNP\NetworkProvider, \NetworkProvider, \Driver
AccessMask2in 1, eq 10x120089, 0x1F3FFF, 0x1fffff, 0x100

Top indicator values (381 distinct)

Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.

FieldKindValueRules (here)Corpus reach
TargetImageeq?:\WINDOWS\system32\lsass.exe3
PropertiesmatchDS-Replication-Get-Changes-In-Filtered-Set2
PropertiesmatchDS-Replication-Get-Changes-All2
Propertiesmatch1131f6ad-9c07-11d1-f79f-00c04fc2dcd222
Propertiesmatch1131f6aa-9c07-11d1-f79f-00c04fc2dcd222
Propertiesmatch89e95b76-444d-4c62-991a-0facbeda640c22
PropertiesmatchDS-Replication-Get-Changes2
event.categoryeqprocess22
CommandLinematchlsass24
CommandLinecontains-ma2
CommandLinematch-accepteula2
Propertiesmatch612cb747-c0e8-4f92-9221-fdd5f15b550d1
Propertiesmatchb7ff5a38-0818-42b0-8110-d3d154c97f241
Propertiesmatchb3f93023-9239-4f7c-b99c-6745d87adbc21
Propertiesmatchb8dfa744-31dc-4ef1-ac7c-84baf7ef9da71
AccessMaskin0x1F3FFF1
AccessMaskin0x10101
ObjectNameends_with\\Windows\\System32\\lsass.exe1
AccessMaskin0x1200891
AccessMaskDescriptioninREAD_CONTROL1

Common exclusions (61 distinct)

Field/operator/value combinations that rules under this technique routinely exclude (top-level not() clauses). These are the false-positive paths the community has learned to filter out. A new rule that ignores the high-count entries here will likely fire on the same noisy paths.

FieldKindValueRules excluding
userends_with$2
userstarts_withMSOL_2
AccessMaskin0x01
SubjectUserSideqS-1-5-181
AccessMaskin0x1001
process_nameinC:\Windows\explorer.exe1
process_nameinC:\Windows\SysWOW64\wbem\WmiPrvSE.exe1
process_nameinC:\Windows\System32\msiexec.exe1
process_nameinC:\Windows\System32\wbem\WmiPrvSE.exe1
process_nameinC:\Windows\System32\dllhost.exe1
process_nameinC:\Windows\System32\svchost.exe1
LogonIdeq0x3e71
Resourceeqhttp://localhost/1
Imageeq?:\Windows\System32\WerFault.exe1
Imageeq?:\Windows\System32\WerFaultSecure.exe1

Rules under this technique

Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.

Sigma 22 rules

Elastic 14 rules

Splunk 4 rules

Kusto Query Language 6 rules