DET0437 Detection of LSA Secrets Dumping via Registry and Memory Extraction
| Item |
Value |
| ID |
DET0437 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1003.004 (LSA Secrets)
Analytics
Windows
AN1212
Detects adversary activity aimed at accessing LSA Secrets, including registry key export of HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets or memory scraping via tools such as Mimikatz or PowerSploit’s Invoke-Mimikatz.
Log Sources
Mutable Elements
| Field |
Description |
| TargetObject |
Target registry paths like HKLM\SECURITY\Policy\Secrets or variants can be tuned depending on OS version or registry redirection settings. |
| ImageLoaded |
Module names such as lsasrv.dll, sechost.dll, or suspicious DLLs loaded by user processes may require tuning for known-good service operations. |
| AccessMask |
Tuning based on whether processes are using specific sensitive access rights (e.g., 0x2 or 0x4). |
| TimeWindow |
Temporal window between registry access and command-line tool execution. |