Detecting DCSync Attacks with DKTrace ITDR
How DKTrace correlates Windows Event ID 4662 with LDAP query patterns to detect DCSync in under 2 seconds — with zero Sigma rule tuning required.
DKTrace Research Team
Security Engineering · Threat Research
What Is DCSync?
DCSync is a credential-theft technique where an attacker mimics an Active Directory domain controller to request password hashes for any user — including Domain Admins — via the MS-DRSR protocol. Tools: Mimikatz, Impacket secretsdump.
How DKTrace Detects It
DKTrace's ITDR module monitors Windows Security Event 4662 (An operation was performed on an object). When the Access Mask includes Control Access Rights and the Properties field contains:
1131f6aa — DS-Replication-Get-Changes1131f6ad — DS-Replication-Get-Changes-AllSigma rule T1003.006 fires immediately.
The correlation engine then:
Detection Timeline (Production Measurements)
| Event | Timestamp |
|---|---|
| Event ingested by agent-receiver | T+0ms |
| Normalised to DCEM canonical model | T+12ms |
| Enriched with asset context | T+28ms |
| Sigma rule T1003.006 fired | T+41ms |
| UEBA baseline checked | T+89ms |
| Correlation links to Kerberoasting 3h prior | T+156ms |
| P1 incident created with MITRE mapping | T+203ms |
| SOC analyst notified via PagerDuty | T+1.8s |
Automated Playbook Response
DKTrace auto-triggers playbook ITDR-DCSync-001:
AUTO tier (immediate, no approval):
MANAGER tier (SOC manager approval):
CISO tier (CISO approval):
What to Do If You See This Alert
See It Live
Watch DKTrace detect this threat in your environment
Our engineers will run a live detection simulation against a sample of your log telemetry — no agents, no commitment.
Request a Live Demo