T1003.002
Security Account Manager
Adversaries attempt to extract credential material from the Security Account Manager (SAM) database containing local account NTLM hashes. The SAM requires SYSTEM-level access. Methods include: registry export (reg save HKLM\sam; reg save HKLM\system), Volume Shadow Copy access, Mimikatz lsadump::sam, secretsdump.py, gsecdump, pwdump, and creddump7. Used by APT29, APT41, Daggerfly, GALLIUM, Wizard Spider, Ember Bear, Agrius, and ransomware operators universally. Combined with the SYSTEM hive, SAM allows offline hash extraction.
Microsoft Sentinel / Defender
kusto
let SAMRegistryDump = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "reg.exe"
| where ProcessCommandLine has_all ("save", "hklm\\sam")
or ProcessCommandLine has_all ("save", "hklm\\system")
or ProcessCommandLine has_all ("save", "hklm\\security")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName;
let SAMShadowCopyAccess = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("esentutl.exe", "ntdsutil.exe")
| where ProcessCommandLine has_any ("sam", "ntds", "shadow")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName;
let MimikatzSAM = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any ("lsadump::sam", "lsadump::cache", "sekurlsa::msv")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let VSSForSAM = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "vssadmin.exe"
| where ProcessCommandLine has_any ("create shadow", "list shadows")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union SAMRegistryDump, SAMShadowCopyAccess, MimikatzSAM, VSSForSAM
| sort by Timestamp desc critical severity
high confidence
Data Sources
Windows Registry: Registry Key Access Process: Process Creation Command: Command Execution
Required Tables
DeviceProcessEvents
False Positives
- Authorized backup solutions using Volume Shadow Copy that may trigger vssadmin alerts
- IT administrators performing registry backups as part of documented maintenance procedures
- Incident response tools running forensic collection scripts that export SAM/SYSTEM hives
- Antivirus or EDR agents performing system state backups
Last updated: 2026-04-13 Research depth: deep
References (5)
- https://attack.mitre.org/techniques/T1003/002/
- https://github.com/Neohapsis/creddump7
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.002/T1003.002.md
- https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-hashes-from-sam-registry
- https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-sam
Unlock Pro Content
Get the full detection package for T1003.002 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance