Potential Credential Access via Windows Utilities
This rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.
This rule identifies the execution of Windows utilities commonly abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access. Attackers often leverage these tools to extract sensitive information, such as user credentials and domain secrets. The utilities of interest include procdump, ProcessDump.exe, WriteMiniDump.exe, RUNDLL32.EXE, RdrLeakDiag.exe, SqlDumper.exe, TTTracer.exe, ntdsutil.exe, and diskshadow.exe. The rule focuses on detecting specific command-line arguments and process names indicative of credential dumping activities. This activity is typically associated with post-exploitation phases, where attackers aim to escalate privileges and move laterally within a network. This detection is crucial for defenders as it can reveal ongoing credential theft attempts, allowing for prompt intervention and mitigation.
Attack Chain
- The attacker gains initial access to a Windows system through various means, such as phishing, exploiting vulnerabilities, or using compromised credentials.
- The attacker executes a privileged process, such as
cmd.exeorpowershell.exe, to perform reconnaissance and identify potential targets for credential dumping. - The attacker uses a utility like
procdump.exewith the-maflag to dump the LSASS process memory (procdump.exe -ma lsass.exe). - Alternatively, the attacker uses
ntdsutil.exeto create an IFM (Install From Media) snapshot of the Active Directory database (ntdsutil.exe "ac i ntds" "ifm" "cr fu c:\\temp" q q). - The attacker may use
diskshadow.exewith a script (/s) to create shadow copies of the system volume, potentially including the NTDS.dit file. - The attacker stages the dumped credentials or database files in a temporary directory.
- The attacker compresses the staged data using archiving tools for easier transfer.
- Finally, the attacker exfiltrates the compressed data to an external server for further analysis and credential harvesting.
Impact
Successful exploitation can lead to widespread credential compromise, allowing attackers to gain unauthorized access to sensitive systems and data. Credential theft can enable lateral movement within the network, privilege escalation, and ultimately, data exfiltration or ransomware deployment. The targeted dumping of LSASS memory exposes user credentials, while the extraction of the Active Directory database can compromise the entire domain. The severity of the impact depends on the scope of the compromise and the sensitivity of the affected data.
Recommendation
- Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious process execution patterns indicative of credential dumping (Sigma rule: “Potential Credential Access via Procdump”).
- Monitor process creation events for the execution of known credential dumping utilities with suspicious command-line arguments using the provided Sigma rules, enabling process creation logging via Sysmon (Sigma rule: “Potential Credential Access via NTDSUtil”).
- Implement application control policies to restrict the execution of unauthorized or untrusted binaries, especially those associated with credential dumping, referencing the list of tools described in the Overview.
- Review and harden Active Directory security configurations to prevent unauthorized access to the NTDS.dit file, using Microsoft’s security guidance.
- Regularly audit and monitor systems for suspicious file creation and modification events, particularly those involving potential credential dumps, and ensure proper file integrity monitoring is enabled.
Detection coverage 3
Potential Credential Access via Procdump
highDetects the execution of procdump.exe with the -ma flag, which is commonly used to dump the LSASS process for credential access.
Potential Credential Access via NTDSUtil
highDetects the execution of ntdsutil.exe with arguments used to create an IFM (Install From Media) snapshot of the Active Directory database.
Potential Credential Access via DiskShadow
highDetects the execution of diskshadow.exe with the /s argument to run commands from script.
Detection queries are kept inside the platform. Get full rules →