detecting-t1003-credential-dumping-with-edr

Installation
SKILL.md

Detecting T1003 Credential Dumping with EDR

When to Use

  • When hunting for credential theft activity in the environment
  • After compromise indicators suggest attacker has elevated privileges
  • When EDR alerts fire for LSASS access or suspicious process memory reads
  • During incident response to determine scope of credential compromise
  • When auditing LSASS protection controls (Credential Guard, RunAsPPL)

Prerequisites

  • EDR agent deployed with LSASS access monitoring (CrowdStrike, Defender for Endpoint, SentinelOne)
  • Sysmon Event ID 10 (ProcessAccess) with LSASS-specific filters
  • Windows Security Event ID 4656/4663 (Object Access Auditing)
  • LSASS SACL auditing enabled (Windows 10+)
  • Registry auditing for SAM hive access

Workflow

Related skills
Installs
4
GitHub Stars
6.2K
First Seen
Mar 18, 2026