T1003.005

Cached Domain Credentials

Adversaries access cached domain credentials (DCC2/MS-Cache v2) stored locally for offline authentication when domain controllers are unavailable. On Windows, these are stored as MSCACHE v2 (PBKDF2-derived) hashes in HKLM\SECURITY\Cache and cannot be used for pass-the-hash but can be cracked offline. Linux systems using SSSD store cached credentials at /var/lib/sss/db/cache.[domain].ldb. Tools include Mimikatz (lsadump::cache), LaZagne, Cachedump, and Quarks PwDump. Used by Okrum, APT33, OilRig, Leafminer, MuddyWater.

Microsoft Sentinel / Defender
kusto
let CachedCredDump = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
    "lsadump::cache", "cachedump", "ms-cache", "mscache",
    "cas_dump", "cachedump"
  )
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let LSACacheRegistry = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has @"SECURITY\Cache"
    or RegistryKey has @"SECURITY\Policy\Secrets\NL$"
| where InitiatingProcessFileName !in~ ("lsass.exe", "svchost.exe", "services.exe")
| project Timestamp, DeviceName, AccountName, ActionType, RegistryKey,
          InitiatingProcessFileName, InitiatingProcessCommandLine;
let LaZagneCached = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("lazagne.exe", "cachedump.exe", "fgdump.exe", "gsecdump.exe")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
let LinuxSSSDAccess = DeviceFileEvents
| where Timestamp > ago(24h)
| where FolderPath has "/var/lib/sss/db/"
    or FolderPath has "/var/opt/quest/vas/authcache/"
| where ActionType in ("FileAccessed", "FileCopied")
| where InitiatingProcessFileName !in~ ("sssd", "sssd_nss", "sssd_pam")
| project Timestamp, DeviceName, FolderPath, FileName, ActionType, InitiatingProcessFileName;
union CachedCredDump, LSACacheRegistry, LaZagneCached, LinuxSSSDAccess
| sort by Timestamp desc
high severity high confidence

Data Sources

Windows Registry: Registry Key Access Process: Process Creation File: File Access Command: Command Execution

Required Tables

DeviceProcessEvents DeviceRegistryEvents DeviceFileEvents

False Positives

  • Security auditing tools inventorying cached credentials as part of authorized security assessments
  • Incident response tooling that reads SECURITY\Cache for forensic purposes during authorized investigations
  • Enterprise password auditing solutions scanning cached credential strength
  • Backup agents with SYSTEM privileges reading SECURITY hive including Cache key

Unlock Pro Content

Get the full detection package for T1003.005 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections