Windows LAPS Credential Dump From Entra ID

Detects when an account dumps the LAPS password from Entra ID.

Sigma rule (View on GitHub)

 1title: Windows LAPS Credential Dump From Entra ID
 2id: a4b25073-8947-489c-a8dd-93b41c23f26d
 3status: experimental
 4description: Detects when an account dumps the LAPS password from Entra ID.
 5references:
 6    - https://twitter.com/NathanMcNulty/status/1785051227568632263
 7    - https://www.cloudcoffee.ch/microsoft-365/configure-windows-laps-in-microsoft-intune/
 8    - https://techcommunity.microsoft.com/t5/microsoft-entra-blog/introducing-windows-local-administrator-password-solution-with/ba-p/1942487
 9author: andrewdanis
10date: 2024-06-26
11tags:
12    - attack.t1098.005
13logsource:
14    product: azure
15    service: auditlogs
16detection:
17    selection:
18        category: 'Device'
19        activityType|contains: 'Recover device local administrator password'
20        additionalDetails.additionalInfo|contains: 'Successfully recovered local credential by device id'
21    condition: selection
22falsepositives:
23    - Approved activity performed by an Administrator.
24level: high

References

to-top