T1556.001

Domain Controller Authentication

Adversaries may patch the authentication process on a domain controller to bypass typical authentication mechanisms and enable access to accounts. Malware such as Skeleton Key is injected into LSASS on a domain controller, allowing any user to authenticate with a hardcoded backdoor password. The patch persists only in memory and is erased upon reboot, making detection during active exploitation critical. Chimera group has used this technique to allow login without valid credentials.

Microsoft Sentinel / Defender
kusto
let SkeletonKeyIndicators = dynamic([
  "SkeletonKey", "skeleton key", "mimikatz", "misc::skeleton",
  "sekurlsa::pth", "lsadump::lsa"
]);
let SuspiciousLSASSAccess = DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ProcessAccessed"
| where FileName =~ "lsass.exe"
| where InitiatingProcessFileName !in~ (
    "MsMpEng.exe", "csrss.exe", "werfault.exe", "taskmgr.exe",
    "services.exe", "lsm.exe", "svchost.exe", "winlogon.exe"
  )
| where InitiatingProcessGrantedAccessMask has_any ("0x1fffff", "0x1f3fff", "0x143a", "0x1010")
| project Timestamp, DeviceName, InitiatingProcessFileName,
          InitiatingProcessCommandLine, InitiatingProcessAccountName,
          GrantedAccess = InitiatingProcessGrantedAccessMask;
let DCProcessEvents = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (SkeletonKeyIndicators)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine;
union SuspiciousLSASSAccess, DCProcessEvents
| sort by Timestamp desc
critical severity high confidence

Data Sources

Process: Process Access Process: Process Creation Microsoft Defender for Endpoint DeviceEvents

Required Tables

DeviceEvents DeviceProcessEvents

False Positives

  • Legitimate endpoint detection and response (EDR) agents that access LSASS for memory scanning (e.g., CrowdStrike Falcon, Carbon Black) — verify via InitiatingProcessFileName allowlist
  • Windows Error Reporting (WerFault.exe) creating LSASS dumps for debugging — check for corresponding WER entries in Event Log
  • System Center Configuration Manager (SCCM) or Tanium performing inventory scans that briefly touch LSASS
  • Antivirus or HIPS software performing process inspection during signature updates

Unlock Pro Content

Get the full detection package for T1556.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections