heroui logo

SecretDumps Offline NTDS Dumping Tool

Splunk Security Content

View Source
Summary
The 'SecretDumps Offline NTDS Dumping Tool' analytic detection rule is designed to identify instances where the 'secretsdump.py' tool is used to extract NTLM hashes from the Windows NT Directory Services (NTDS) database, along with system, security, and SAM registry hives. This detection primarily relies on data sourced from Endpoint Detection and Response (EDR) solutions, utilizing specific command-line syntax and process names that are characteristic of the 'secretsdump.py' tool. The rule targets processes initiated using Python that include keywords relevant to NTDS and registry hives, indicating a possible offline credential dumping attempt by an attacker. If such activity is confirmed as malicious, it poses a significant risk as it could lead to unauthorized access to accounts and lateral movement within the network, ultimately enabling privilege escalation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Logon Session
ATT&CK Techniques
  • T1003.003
  • T1003
Created: 2024-12-10