T1556.001
Domain Controller Authentication
Adversaries may patch the authentication process on a domain controller to bypass typical authentication mechanisms and enable access to accounts. Malware such as Skeleton Key is injected into LSASS on a domain controller, allowing any user to authenticate with a hardcoded backdoor password. The patch persists only in memory and is erased upon reboot, making detection during active exploitation critical. Chimera group has used this technique to allow login without valid credentials.
Microsoft Sentinel / Defender
kusto
let SkeletonKeyIndicators = dynamic([
"SkeletonKey", "skeleton key", "mimikatz", "misc::skeleton",
"sekurlsa::pth", "lsadump::lsa"
]);
let SuspiciousLSASSAccess = DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ProcessAccessed"
| where FileName =~ "lsass.exe"
| where InitiatingProcessFileName !in~ (
"MsMpEng.exe", "csrss.exe", "werfault.exe", "taskmgr.exe",
"services.exe", "lsm.exe", "svchost.exe", "winlogon.exe"
)
| where InitiatingProcessGrantedAccessMask has_any ("0x1fffff", "0x1f3fff", "0x143a", "0x1010")
| project Timestamp, DeviceName, InitiatingProcessFileName,
InitiatingProcessCommandLine, InitiatingProcessAccountName,
GrantedAccess = InitiatingProcessGrantedAccessMask;
let DCProcessEvents = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (SkeletonKeyIndicators)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union SuspiciousLSASSAccess, DCProcessEvents
| sort by Timestamp desc critical severity
high confidence
Data Sources
Process: Process Access Process: Process Creation Microsoft Defender for Endpoint DeviceEvents
Required Tables
DeviceEvents DeviceProcessEvents
False Positives
- Legitimate endpoint detection and response (EDR) agents that access LSASS for memory scanning (e.g., CrowdStrike Falcon, Carbon Black) — verify via InitiatingProcessFileName allowlist
- Windows Error Reporting (WerFault.exe) creating LSASS dumps for debugging — check for corresponding WER entries in Event Log
- System Center Configuration Manager (SCCM) or Tanium performing inventory scans that briefly touch LSASS
- Antivirus or HIPS software performing process inspection during signature updates
Last updated: 2026-04-13 Research depth: deep
References (7)
- https://attack.mitre.org/techniques/T1556/001/
- https://www.secureworks.com/research/skeleton-key-malware-analysis
- https://technet.microsoft.com/en-us/library/dn487457.aspx
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1556.001/T1556.001.md
- https://blog.gentilkiwi.com/securite/mimikatz/skeleton-key
- https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard
- https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea
Unlock Pro Content
Get the full detection package for T1556.001 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance