T1003.004

LSA Secrets

Adversaries with SYSTEM access dump LSA secrets from HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets, which contain service account credentials, auto-logon passwords, IIS application pool credentials, scheduled task credentials, and VPN/dial-up credentials. Tools include Mimikatz (lsadump::secrets), Impacket secretsdump.py, gsecdump, LaZagne, and reg.exe to export HKLM\SECURITY. Used by MuddyWater, APT33, APT29, OilRig, Ember Bear, Leafminer, and many others. Service account credentials from LSA secrets enable lateral movement to the services those accounts manage.

Microsoft Sentinel / Defender
kusto
let LSARegistryAccess = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has @"SECURITY\Policy\Secrets"
    or (RegistryKey has @"HKLM\SECURITY" and RegistryKey has "Policy")
| where InitiatingProcessFileName !in~ ("lsass.exe", "svchost.exe", "services.exe")
| project Timestamp, DeviceName, AccountName, ActionType, RegistryKey,
          InitiatingProcessFileName, InitiatingProcessCommandLine;
let LSADumpCommands = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
    "lsadump::secrets", "lsadump::cache",
    "secretsdump", "lsa_secrets", "LSAsecret"
  )
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let RegExportSecurity = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "reg.exe"
| where ProcessCommandLine has "save" and ProcessCommandLine has_any ("hklm\\security", "security")
    and not (ProcessCommandLine has "hklm\\system")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union LSARegistryAccess, LSADumpCommands, RegExportSecurity
| sort by Timestamp desc
critical severity high confidence

Data Sources

Windows Registry: Registry Key Access Process: Process Creation Command: Command Execution

Required Tables

DeviceRegistryEvents DeviceProcessEvents

False Positives

  • Security scanning tools or EDR products performing credential audit checks on HKLM\SECURITY
  • IT administrators running authorized credential audit scripts to inventory service account usage
  • Incident response tools collecting system state information including LSA secrets
  • Backup software with SYSTEM privileges reading SECURITY hive as part of system state backup

Unlock Pro Content

Get the full detection package for T1003.004 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections