T1003.006
DCSync
Adversaries abuse the Windows Directory Replication Service (DRSUAPI) API to simulate replication from a domain controller and extract password data without direct access to the NTDS.dit file. Members of Administrators, Domain Admins, or Enterprise Admins groups can call IDL_DRSGetNCChanges to pull NTLM hashes and historical hashes for accounts including krbtgt. Mimikatz implements this as 'lsadump::dcsync'. Used by Mimikatz, Cobalt Strike, Earth Lusca, Mustang Panda, Storm-0501, and LAPSUS$. Enables Golden Ticket creation via krbtgt hash extraction.
Microsoft Sentinel / Defender
kusto
let DCSyncAuditEvents = SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4662
| where ObjectType in~ ("domainDNS", "domain")
// DS-Replication-Get-Changes (1131f6aa) and DS-Replication-Get-Changes-All (1131f6ad)
| where Properties has "1131f6aa-9c07-11d1-f79f-00c04fc2dcd2"
or Properties has "1131f6ad-9c07-11d1-f79f-00c04fc2dcd2"
or AccessMask == "0x100"
// Exclude machine accounts (DCs replicate normally)
| where not(SubjectUserName endswith "$")
// Exclude known sync accounts (e.g., Azure AD Connect)
| project TimeGenerated, Computer, SubjectUserName, SubjectDomainName,
ObjectName, AccessMask, Properties;
let DCSyncTooling = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
"lsadump::dcsync", "dcsync", "DCSync",
"drsuapi", "GetNCChanges", "IDL_DRSGetNCChanges"
)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union DCSyncAuditEvents, DCSyncTooling
| sort by TimeGenerated desc, Timestamp desc critical severity
high confidence
Data Sources
Active Directory: Active Directory Object Access Process: Process Creation Windows Security Event Log
Required Tables
SecurityEvent DeviceProcessEvents
False Positives
- Azure AD Connect and other legitimate directory synchronization services that use DRSUAPI (configure an explicit exclusion for the sync account)
- Active Directory replication between domain controllers — machine accounts (ending in $) are excluded but verify the exclusion is complete
- Privileged Identity Management (PIM) tooling that reads directory data via replication APIs
- Directory Services administrative tools run by authorized AD administrators during maintenance
Last updated: 2026-04-13 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1003/006/
- https://adsecurity.org/?p=1729
- https://msdn.microsoft.com/library/cc228086.aspx
- https://github.com/gentilkiwi/mimikatz/wiki/module-~-lsadump
- https://blog.harmj0y.net/redteaming/mimikatz-and-dcsync-and-extrasids-oh-my/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1003.006/T1003.006.md
Unlock Pro Content
Get the full detection package for T1003.006 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance