T1003.006

DCSync

Adversaries abuse the Windows Directory Replication Service (DRSUAPI) API to simulate replication from a domain controller and extract password data without direct access to the NTDS.dit file. Members of Administrators, Domain Admins, or Enterprise Admins groups can call IDL_DRSGetNCChanges to pull NTLM hashes and historical hashes for accounts including krbtgt. Mimikatz implements this as 'lsadump::dcsync'. Used by Mimikatz, Cobalt Strike, Earth Lusca, Mustang Panda, Storm-0501, and LAPSUS$. Enables Golden Ticket creation via krbtgt hash extraction.

Microsoft Sentinel / Defender
kusto
let DCSyncAuditEvents = SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID == 4662
| where ObjectType in~ ("domainDNS", "domain")
// DS-Replication-Get-Changes (1131f6aa) and DS-Replication-Get-Changes-All (1131f6ad)
| where Properties has "1131f6aa-9c07-11d1-f79f-00c04fc2dcd2"
    or Properties has "1131f6ad-9c07-11d1-f79f-00c04fc2dcd2"
    or AccessMask == "0x100"
// Exclude machine accounts (DCs replicate normally)
| where not(SubjectUserName endswith "$")
// Exclude known sync accounts (e.g., Azure AD Connect)
| project TimeGenerated, Computer, SubjectUserName, SubjectDomainName,
          ObjectName, AccessMask, Properties;
let DCSyncTooling = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (
    "lsadump::dcsync", "dcsync", "DCSync",
    "drsuapi", "GetNCChanges", "IDL_DRSGetNCChanges"
  )
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union DCSyncAuditEvents, DCSyncTooling
| sort by TimeGenerated desc, Timestamp desc
critical severity high confidence

Data Sources

Active Directory: Active Directory Object Access Process: Process Creation Windows Security Event Log

Required Tables

SecurityEvent DeviceProcessEvents

False Positives

  • Azure AD Connect and other legitimate directory synchronization services that use DRSUAPI (configure an explicit exclusion for the sync account)
  • Active Directory replication between domain controllers — machine accounts (ending in $) are excluded but verify the exclusion is complete
  • Privileged Identity Management (PIM) tooling that reads directory data via replication APIs
  • Directory Services administrative tools run by authorized AD administrators during maintenance

Unlock Pro Content

Get the full detection package for T1003.006 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections