T1003.004
LSA Secrets
Adversaries with SYSTEM access dump LSA secrets from HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets, which contain service account credentials, auto-logon passwords, IIS application pool credentials, scheduled task credentials, and VPN/dial-up credentials. Tools include Mimikatz (lsadump::secrets), Impacket secretsdump.py, gsecdump, LaZagne, and reg.exe to export HKLM\SECURITY. Used by MuddyWater, APT33, APT29, OilRig, Ember Bear, Leafminer, and many others. Service account credentials from LSA secrets enable lateral movement to the services those accounts manage.
Microsoft Sentinel / Defender
kusto
let LSARegistryAccess = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has @"SECURITY\Policy\Secrets"
or (RegistryKey has @"HKLM\SECURITY" and RegistryKey has "Policy")
| where InitiatingProcessFileName !in~ ("lsass.exe", "svchost.exe", "services.exe")
| project Timestamp, DeviceName, AccountName, ActionType, RegistryKey,
InitiatingProcessFileName, InitiatingProcessCommandLine;
let LSADumpCommands = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
"lsadump::secrets", "lsadump::cache",
"secretsdump", "lsa_secrets", "LSAsecret"
)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let RegExportSecurity = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "reg.exe"
| where ProcessCommandLine has "save" and ProcessCommandLine has_any ("hklm\\security", "security")
and not (ProcessCommandLine has "hklm\\system")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union LSARegistryAccess, LSADumpCommands, RegExportSecurity
| sort by Timestamp desc critical severity
high confidence
Data Sources
Windows Registry: Registry Key Access Process: Process Creation Command: Command Execution
Required Tables
DeviceRegistryEvents DeviceProcessEvents
False Positives
- Security scanning tools or EDR products performing credential audit checks on HKLM\SECURITY
- IT administrators running authorized credential audit scripts to inventory service account usage
- Incident response tools collecting system state information including LSA secrets
- Backup software with SYSTEM privileges reading SECURITY hive as part of system state backup
Last updated: 2026-04-13 Research depth: deep
References (5)
- https://attack.mitre.org/techniques/T1003/004/
- https://www.passcape.com/index.php?section=docsys&cmd=details&id=23
- https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsa-secrets
- https://www.first.org/resources/papers/conf2017/Windows-Credentials-Attacks-and-Mitigation-Techniques.pdf
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.004/T1003.004.md
Unlock Pro Content
Get the full detection package for T1003.004 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance