Mimikatz or credential dumping tool signatures fired
SAM or NTDS.dit database access alert
Suspicious process accessing lsass.exe
Multiple failed authentications followed by successful logins
Post-exploitation credential harvesting suspected
[01]
Alert Triage & Tool Identification
▶
You are a SOC analyst investigating a credential dumping alert.
Assume an enterprise Windows environment unless I specify otherwise.
Paste the raw alert, EDR detection, or SIEM log below.
Analyze the following:
1. What tool or technique does this alert suggest?
- Mimikatz / variants (sekurlsa, lsadump)
- ProcDump / Task Manager LSASS dump
- Volume Shadow Copy / NTDS.dit access
- DCSync attack (replication rights abuse)
- Registry SAM/SECURITY/SYSTEM hive access
- LSASS memory injection
2. What process triggered the alert?
- Process name, PID, parent process
- User context (SYSTEM, admin, standard user)
- Execution path (suspicious if in temp, appdata, or unusual location)
3. What is the immediate risk level?
- Is this on a Domain Controller? (CRITICAL)
- Is this on a privileged workstation?
- Is the triggering account a service account or admin?
Output format:
ALERT SUMMARY
- Detection Type: [tool/technique identified]
- Triggering Process: [process name + path]
- User Context: [who ran it]
- Target: [what was accessed - LSASS / SAM / NTDS]
- Initial Risk: Critical / High / Medium / Low
CONFIDENCE
- Confidence this is malicious: High / Medium / Low
- Reason: [one sentence]
Only analyze what is present in the data provided.
Do not guess or assume values not in the alert.
[PASTE CREDENTIAL DUMPING ALERT OR EDR DETECTION HERE]
[02]
Technique Analysis & MITRE Mapping
▶
Based on the credential dumping alert from Step 1, perform a detailed technique analysis.
1. Map the technique to MITRE ATT&CK:
- Primary technique (e.g. T1003.001 — LSASS Memory)
- Sub-techniques if applicable
- Associated tactics (Credential Access, Privilege Escalation, Lateral Movement)
2. Identify what credentials are at risk:
- NTLM hashes (pass-the-hash risk)
- Kerberos tickets (pass-the-ticket / golden ticket risk)
- Plaintext credentials (WDigest enabled?)
- Service account credentials
- Domain Admin credentials
3. Assess post-exploitation risk:
- Can dumped credentials enable lateral movement?
- Can they enable privilege escalation?
- Is Domain Controller compromise possible?
- What systems are reachable with these credentials?
4. List top 3 false positive scenarios for this specific alert.
Output format:
MITRE ATT&CK MAPPING
| Tactic | Technique ID | Technique Name | Confidence |
CREDENTIALS AT RISK
| Credential Type | Risk | Impact if Compromised |
POST-EXPLOITATION RISK
- Lateral Movement: Yes / No / Unknown — [reason]
- Privilege Escalation: Yes / No / Unknown — [reason]
- DC Compromise Risk: Yes / No / Unknown — [reason]
FALSE POSITIVES
1. [scenario]
2. [scenario]
3. [scenario]
Base everything on the actual alert data provided.
[03]
Investigation Checklist & Containment
▶
Generate a targeted investigation and containment checklist for this credential dumping alert.
For each checklist item provide:
- Exact log source to check
- Specific event IDs or field values
- What malicious looks like vs benign
INVESTIGATION CHECKLIST:
1. Process Investigation
- Review full process tree (parent → child)
- Check process execution path for anomalies
- Verify process hash against known-good baseline
- Event IDs: 4688 (process creation), Sysmon 1, 10 (process access)
2. LSASS Access Verification
- Check which processes accessed lsass.exe
- Look for OpenProcess with PROCESS_VM_READ on LSASS
- Sysmon Event ID 10 — ProcessAccess targeting lsass.exe
3. Authentication Log Review
- Check for new logon events after alert time (4624, 4625, 4648)
- Look for lateral movement: remote logons from affected host
- Check for Pass-the-Hash: NTLMv2 authentication anomalies
4. Network Activity
- Outbound connections from affected host after alert
- SMB connections to other hosts (lateral movement indicator)
- Any C2 beacon patterns
5. Containment Actions (prioritise these)
HIGH PRIORITY: Should affected host be isolated immediately?
HIGH PRIORITY: Should affected credentials be reset immediately?
- Force password reset for all accounts on affected system
- Revoke active sessions and Kerberos tickets (klist purge)
- If DC involved: consider krbtgt password reset
Also provide 3 SIEM queries to hunt for related credential dumping activity.
If SIEM tool is known, write queries for that tool.
If unknown, write generic logic with clearly labelled placeholders like [field_name].
Base everything on the actual alert data. Do not give generic SOC advice.
[04]
SOC Ticket Summary
▶
Write a professional SOC ticket summary for this credential dumping investigation.
Include:
- What the alert detected (one sentence)
- Whether it appears malicious, suspicious, or benign and why
- The key evidence supporting that conclusion
- Recommended next action and who owns it
- Whether immediate containment is required
Length: 3–5 sentences maximum.
Format: suitable for pasting directly into a SIEM ticket or incident log.
Severity: Critical / High / Medium / Low / Informational
Disposition: True Positive / False Positive / Needs Investigation
MITRE ATT&CK MAPPING
| Tactic | Technique ID | Technique Name | Confidence |
IOCS
| IOC Type | Value | Context |
CREDENTIALS POTENTIALLY COMPROMISED
| Account | Type | Reset Required |
CONTAINMENT STATUS
- Host Isolated: Yes / No / Pending
- Credentials Reset: Yes / No / Pending
- Incident Escalated: Yes / No / Pending
If no IOCs identified, state: "No IOCs identified."
Example Output
Here's what you can expect after completing this workflow:
CREDENTIAL DUMPING INVESTIGATION REPORT
========================================
Report ID: CRED-2024-0089
Analyst: SOC Team
Date: 2024-03-22 11:15:00 UTC
ALERT SUMMARY
=============
Detection Type: LSASS Memory Access (T1003.001) — Mimikatz sekurlsa::logonpasswords
Triggering Process: mimikatz.exe (C:\Users\jsmith\AppData\Local\Temp\mimikatz.exe)
User Context: jsmith (standard user — unusual for this technique)
Target: lsass.exe (PID 648)
Initial Risk: CRITICAL
MITRE ATT&CK MAPPING
====================
| Tactic | Technique ID | Technique Name | Confidence |
| Credential Access | T1003.001 | LSASS Memory | High |
| Defense Evasion | T1036 | Masquerading | Medium |
CREDENTIALS AT RISK
===================
| Credential Type | Risk | Impact if Compromised |
| NTLM Hashes | High | Pass-the-Hash lateral movement |
| Kerberos Tickets | High | Pass-the-Ticket / Golden Ticket |
| Domain Admin creds | High | Full domain compromise |
POST-EXPLOITATION RISK
======================
- Lateral Movement: Yes — NTLM hashes enable pass-the-hash to adjacent hosts
- Privilege Escalation: Yes — Domain Admin credentials potentially exposed
- DC Compromise Risk: Yes — dumped credentials include domain admin account
SOC TICKET
==========
Severity: CRITICAL
Disposition: True Positive
Mimikatz execution detected on WKSTN-042 accessing LSASS memory under
standard user jsmith. Binary executed from user temp directory — consistent
with attacker-dropped tooling. Immediate host isolation and credential
reset recommended. Escalate to Tier 3 and IR team.
CONTAINMENT STATUS
==================
- Host Isolated: Pending
- Credentials Reset: Pending
- Incident Escalated: Yes
Generate SOC Investigation Summary
Populate a ready-to-paste investigation report for your ticket or incident log.
Copied!
Get new workflows in your inbox
Stay updated when new SOC workflows drop. No spam, unsubscribe anytime.