Home >
Enterprise >
Participants >
SentinelOne >
OS Credential Dumping (T1003)
|
|
See technique results for:
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
4.B.7
|
|
|||||
15.A.6
|
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
6.C.1
|
|
|||||||
14.B.4
|
|
|||||||
16.D.2
|
|
Procedure
Dumped plaintext credentials using Mimikatz (m.exe)
Criteria
m.exe injecting into lsass.exe to dump credentials
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
APT3 |
||||
Step | ATT&CK Pattern |
|
||
5.A.1.1
|
|
|||
5.A.2.1
|
|
Procedure
Cobalt Strike: Built-in Mimikatz credential dump capability executed
Footnotes
- Vendor states that the capability would normally block credential dumping activity like this, but the mitigation capability was disabled due to the evaluation parameters.