Hands-on LabAdvanced·~75 min·Includes challenge

Lab OS.4 — Credential Theft Detection

Hunt for credential theft indicators on a compromised Windows endpoint using Velociraptor — LSASS dumps, SAM/SYSTEM registry exports, Mimikatz artifacts, and Pass-the-Hash evidence.

Tools needed:Velociraptor

What You'll Learn

  • Identify indicators of LSASS memory access and credential dumping on a Windows endpoint
  • Use Velociraptor artifacts to detect Mimikatz-style tool execution and credential extraction
  • Analyze SAM/SYSTEM registry hive export evidence and pass-the-hash indicators
  • Trace credential theft attack chains from initial access through lateral movement preparation
  • Document credential theft findings with forensic evidence for incident response

Lab Overview

DetailValue
Lab Profilelab-velociraptor
ContainersVelociraptor Server, Velociraptor Client (Windows endpoint)
Estimated Time65–75 minutes
DifficultyAdvanced
Browser AccessVelociraptor Web UI
Pre-Loaded Data10+ planted artifacts: LSASS dumps, credential extraction tools, registry exports, suspicious process traces
DeliverableCredential Theft Investigation Report documenting all discovered credential theft indicators

Why Credential Theft Detection Matters. Credential theft is the gateway to lateral movement. Once an attacker obtains valid credentials — whether through LSASS dumping, SAM extraction, or Kerberos ticket theft — they can move freely across the network appearing as a legitimate user. Detecting credential theft early is the difference between containing a single compromised host and responding to a full domain compromise.


The Scenario

Your SOC has confirmed initial compromise on the endpoint WIN-SERVER-01. A C2 beacon was identified in a previous investigation (Lab OS.3), and now the threat actor has been observed executing post-exploitation activity. Threat intelligence indicates the group uses credential harvesting techniques before lateral movement.

Your task is to use Velociraptor to hunt for credential theft indicators on the compromised endpoint. The attacker may have targeted LSASS process memory, exported registry hives (SAM/SYSTEM/SECURITY), used known credential dumping tools, or staged credentials for exfiltration. You must identify every credential theft technique used and document the evidence chain.

The planted artifacts simulate a realistic attack where the threat actor used multiple credential theft methods — some stealthy, some aggressive — to maximize their chances of obtaining usable credentials before network defenders could respond.


Part 1: Detecting LSASS Memory Access

LSASS (Local Security Authority Subsystem Service) holds plaintext passwords, NTLM hashes, and Kerberos tickets in memory. Dumping LSASS is the single most common credential theft technique.

Step 1.1: Check for LSASS Access with Sysmon

Launch the Velociraptor artifact Windows.EventLogs.EvtxHunter and search for Sysmon Event ID 10 (Process Access) targeting lsass.exe:

Artifact: Windows.EventLogs.EvtxHunter
Parameters:
  EvtxGlob: C:/Windows/System32/winevt/Logs/Microsoft-Windows-Sysmon%4Operational.evtx
  SearchRegex: lsass

Expected Results: Look for entries where a non-system process accessed lsass.exe with suspicious access masks:

  • 0x1010 — PROCESS_QUERY_LIMITED_INFORMATION + PROCESS_VM_READ (MiniDump pattern)
  • 0x1FFFFF — PROCESS_ALL_ACCESS (aggressive, full access)

Record the source process that accessed LSASS. Legitimate processes include csrss.exe, services.exe, and svchost.exe. Anything else warrants investigation.

Step 1.2: Hunt for MiniDump-Style LSASS Dumps

The most common LSASS dump method uses comsvcs.dll via rundll32:

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/Windows/Temp/**/*.dmp

Also check the user's temp and common staging directories:

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/Users/*/AppData/Local/Temp/**/*.dmp

Expected Results: You should find a .dmp file created recently. Note the file size — LSASS dumps are typically 30–150 MB depending on the number of active sessions.

Step 1.3: Check for procdump.exe or comsvcs.dll Usage

Run the artifact to check executed commands:

Artifact: Windows.System.CmdlineHistory

Search the results for:

  • procdump — Sysinternals tool commonly abused for LSASS dumping
  • comsvcs.dll — Native Windows DLL with MiniDump export
  • rundll32 with MiniDump — The classic LOLBin credential dump

Document: Record every command line that references LSASS, process IDs, or dump operations.

LSASS Access Detection Flow

Living Off the Land. Attackers increasingly use built-in Windows tools (rundll32.exe, comsvcs.dll, reg.exe) rather than dropping standalone executables. These "LOLBin" techniques bypass many signature-based detections because the binaries are legitimate, signed Microsoft tools. Focus on the behavior (what the tool is doing) rather than the tool name.


Part 2: Registry Hive Credential Extraction

Windows stores local account hashes in the SAM registry hive, encrypted with the SYSTEM hive's boot key. Attackers export both to crack passwords offline.

Step 2.1: Hunt for Registry Export Commands

Artifact: Windows.System.CmdlineHistory

Search for reg save or reg export commands targeting:

  • HKLM\SAM — Contains local account password hashes
  • HKLM\SYSTEM — Contains the boot key to decrypt SAM
  • HKLM\SECURITY — Contains cached domain credentials and LSA secrets

Expected Results: You should find evidence of at least two registry hive exports. Document the exact commands, output paths, and timestamps.

Step 2.2: Locate Exported Hive Files

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/**/{sam,system,security,sam.save,system.save,security.save}
  SearchFilesGlobTable:
    - C:/Windows/Temp/**/sam*
    - C:/Windows/Temp/**/system*
    - C:/Users/**/sam*
    - C:/Users/**/system*

Expected Results: Exported hive files stored outside their normal C:\Windows\System32\config location are strong indicators of credential theft. Note the file sizes and creation timestamps.

Step 2.3: Check for Shadow Copy Abuse

Sophisticated attackers extract SAM/SYSTEM from Volume Shadow Copies to avoid file locks:

Artifact: Windows.System.CmdlineHistory

Search for vssadmin, wmic shadowcopy, or esentutl commands. These may indicate the attacker created or accessed shadow copies to extract locked registry hives.


Part 3: Tool-Based Credential Theft Detection

Step 3.1: Hunt for Known Credential Dumping Tools

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/**/{mimikatz*,mimi*,sekurlsa*,kiwi*,lazagne*,pypykatz*,SafetyKatz*}

Also check for renamed binaries by searching for common Mimikatz string artifacts in memory or files:

Artifact: Windows.Detection.Yara.NTFS
Parameters:
  PathRegex: .(exe|dll|ps1|py)$
  YaraRule: |
    rule mimikatz_strings {
      strings:
        $s1 = "sekurlsa::logonpasswords" ascii wide
        $s2 = "privilege::debug" ascii wide
        $s3 = "token::elevate" ascii wide
        $s4 = "lsadump::sam" ascii wide
      condition:
        any of them
    }

Expected Results: Even if the attacker renamed the tool, YARA-based detection catches the internal strings.

Step 3.2: PowerShell Credential Theft

Artifact: Windows.EventLogs.EvtxHunter
Parameters:
  EvtxGlob: C:/Windows/System32/winevt/Logs/Microsoft-Windows-PowerShell%4Operational.evtx
  SearchRegex: (Invoke-Mimikatz|Get-Credential|SecureString|ConvertFrom-SecureString|credential|dumpert|Out-Minidump)

Expected Results: Look for PowerShell commands that load credential theft modules, invoke Mimikatz in memory, or convert secure strings back to plaintext.


Part 4: Pass-the-Hash and Lateral Movement Preparation

Step 4.1: Detect Pass-the-Hash Evidence

Pass-the-Hash (PtH) uses stolen NTLM hashes to authenticate without knowing the plaintext password:

Artifact: Windows.EventLogs.EvtxHunter
Parameters:
  EvtxGlob: C:/Windows/System32/winevt/Logs/Security.evtx
  SearchRegex: (4624|4625)

Filter for Logon Type 9 (NewCredentials) or Type 3 (Network) where the authentication package is NTLM. Pass-the-Hash typically shows as:

  • Event ID 4624 with Logon Type 9
  • Authentication Package: NTLM (not Kerberos)
  • Source and target on the same machine (local PtH testing)

Step 4.2: Check for Credential Staging

Attackers often stage stolen credentials in text files before exfiltration:

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/Users/**/Desktop/**/{cred*,pass*,hash*,dump*,*.txt}

Also check common staging directories:

Artifact: Windows.Search.FileFinder
Parameters:
  SearchFilesGlob: C:/Windows/Temp/**/{cred*,pass*,hash*,*.txt}

Expected Results: Look for text files containing usernames, hashes, or extracted credentials. Document the contents and timestamps.

Credential Theft Attack Chain


Part 5: Build the Investigation Report

Compile all findings into a structured credential theft investigation report:

CREDENTIAL THEFT INVESTIGATION REPORT
═══════════════════════════════════════
Endpoint: WIN-SERVER-01
Date: [today's date]
Analyst: [your name]
Classification: CONFIRMED CREDENTIAL THEFT

TECHNIQUE 1: LSASS Memory Dump
  Tool Used: [comsvcs.dll / procdump / other]
  Evidence: [file path, command line, timestamp]
  Access Mask: [Sysmon Event 10 access mask]
  Impact: Plaintext passwords + NTLM hashes exposed

TECHNIQUE 2: Registry Hive Export
  Commands: [reg save commands found]
  Files Found: [exported SAM/SYSTEM paths]
  Impact: Local account hashes available for offline cracking

TECHNIQUE 3: Known Tool Usage
  Tool: [mimikatz / lazagne / custom]
  Detection Method: [file finder / YARA / PowerShell logs]
  Commands Executed: [specific commands or modules used]

TECHNIQUE 4: Pass-the-Hash Preparation
  Evidence: [logon events, credential staging files]
  Target Accounts: [accounts whose hashes were stolen]
  Lateral Movement Risk: [HIGH/CRITICAL]

TIMELINE:
  [timestamp] - First LSASS access detected
  [timestamp] - Registry hives exported
  [timestamp] - Credential file staged
  [timestamp] - PtH logon attempt observed

RECOMMENDATIONS:
  1. Force password reset for all accounts on WIN-SERVER-01
  2. Revoke Kerberos tickets (krbtgt double-reset if domain compromise suspected)
  3. Monitor for lateral movement using stolen credentials
  4. Isolate endpoint for full forensic imaging

Deliverable Checklist

Before completing the lab, ensure you have:

  • LSASS Access Evidence — Sysmon Event 10 records showing non-system process accessing lsass.exe
  • Dump File Located — .dmp file(s) found outside normal system directories
  • Registry Hive Exports — reg save commands and exported SAM/SYSTEM files documented
  • Tool Detection — Credential dumping tool identified via file search or YARA scan
  • PowerShell Evidence — Suspicious PowerShell commands related to credential access reviewed
  • Pass-the-Hash Indicators — NTLM logon events analyzed for PtH patterns
  • Credential Staging — Any text files with extracted credentials located
  • Complete Investigation Report — All techniques documented with evidence and timeline

Key Takeaways

  • LSASS is the primary target for credential theft — detecting access to lsass.exe by non-system processes is critical
  • Registry hive exports (SAM + SYSTEM) enable offline password cracking without triggering account lockout
  • Living-off-the-land techniques (comsvcs.dll, rundll32, reg.exe) bypass signature-based detection — focus on behavior
  • YARA rules catch renamed tools by matching internal strings rather than filenames
  • A complete credential theft investigation requires checking LSASS access, registry exports, tool artifacts, PowerShell logs, and pass-the-hash indicators

What's Next

In Lab OS.5 — Full Persistence Audit, you'll shift from credential theft to persistence — systematically auditing every Windows persistence mechanism to find how the attacker ensured they could return even after a reboot. You'll build a comprehensive Persistence Audit Matrix covering registry keys, scheduled tasks, services, WMI subscriptions, and more.

Lab Challenge: Credential Theft Detection

10 questions · 70% to pass

1

Run the Windows.EventLogs.EvtxHunter artifact searching Sysmon logs for 'lsass'. What Sysmon Event ID indicates one process accessing another's memory?

2

You find a process accessed lsass.exe with access mask 0x1010. What type of credential dumping technique does this access pattern indicate?

3

Use Windows.Search.FileFinder to search C:/Windows/Temp/ for .dmp files. What is the typical size range for an LSASS memory dump, and why does the size matter forensically?

4

Run Windows.System.CmdlineHistory and search for 'comsvcs'. What is the full command syntax an attacker would use to dump LSASS via comsvcs.dll?

5

Search for registry hive exports using CmdlineHistory. Which TWO registry hives must an attacker export together to crack local Windows account passwords offline?

6

Run Windows.Search.FileFinder searching for exported hive files outside C:\Windows\System32\config. Where did the attacker stage the exported SAM and SYSTEM files?

7

Run the YARA scan artifact (Windows.Detection.Yara.NTFS) searching for Mimikatz strings. Which of the following strings is a definitive indicator of Mimikatz, even if the binary has been renamed?

8

Search PowerShell Operational logs for credential-related commands. What makes in-memory PowerShell credential theft (e.g., Invoke-Mimikatz) harder to detect than dropping mimikatz.exe to disk?

9

Examine Security event logs for Event ID 4624 with Logon Type 9 and NTLM authentication. What does this combination specifically indicate?

10

Based on your complete investigation, what is the correct order of the attacker's credential theft kill chain on this endpoint?

0/10 answered