T1003.001
LSASS Memory
Adversaries access credential material stored in the LSASS process memory. After logon, Windows stores credentials (NTLM hashes, Kerberos tickets, plaintext passwords via WDigest) in LSASS. Tools used include Mimikatz, ProcDump, comsvcs.dll MiniDump (rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump), WerFault silent process exit, and Cobalt Strike's sekurlsa module. Used extensively by APT1, APT33, OilRig, HAFNIUM, Volt Typhoon, NotPetya, Cobalt Strike operators, and many others. Highest-frequency credential dumping technique observed in the wild.
Microsoft Sentinel / Defender
kusto
let LsassAccessTools = dynamic([
"procdump", "procdump64", "mimikatz", "mimilib", "wce", "gsecdump",
"lsass.exe", "sqldumper", "werfault", "taskmgr"
]);
let SuspiciousLsassAccess = DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ProcessAccessed"
| where FileName =~ "lsass.exe"
| where InitiatingProcessFileName !in~ (
"MsMpEng.exe", "csrss.exe", "services.exe", "lsm.exe",
"svchost.exe", "winlogon.exe", "wmiprvse.exe", "wininit.exe",
"SecurityHealthService.exe", "SenseIR.exe"
)
| where InitiatingProcessGrantedAccessMask in (
"0x1fffff", "0x1f3fff", "0x143a", "0x1410", "0x1010", "0x40"
)
| project Timestamp, DeviceName, InitiatingProcessFileName, InitiatingProcessCommandLine,
InitiatingProcessAccountName, InitiatingProcessGrantedAccessMask;
let ComsvcsMinidump = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "rundll32.exe"
| where ProcessCommandLine has_all ("comsvcs.dll", "MiniDump")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let ProcDumpLsass = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("procdump.exe", "procdump64.exe")
| where ProcessCommandLine has "lsass"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union SuspiciousLsassAccess, ComsvcsMinidump, ProcDumpLsass
| sort by Timestamp desc critical severity
high confidence
Data Sources
Process: Process Access Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceEvents DeviceProcessEvents
False Positives
- EDR agents (CrowdStrike, Carbon Black, Cylance) that legitimately access LSASS for memory scanning — these should be in the process exclusion list
- Windows Error Reporting (WerFault.exe) creating crash dumps when LSASS encounters an error
- IT administrators using Task Manager to create LSASS dump for legitimate debugging purposes
- Sysinternals ProcDump used by operations teams for authorized crash dump collection
Last updated: 2026-04-13 Research depth: deep
References (7)
- https://attack.mitre.org/techniques/T1003/001/
- https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea
- https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
- https://www.deepinstinct.com/blog/lsass-memory-dumps-are-stealthier-than-ever-before-part-2
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.001/T1003.001.md
- https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard
- https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection
Unlock Pro Content
Get the full detection package for T1003.001 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance