Use Alternate Authentication Material: Pass the Hash

Adversaries may "pass the hash" using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication steps that require a cleartext password, moving directly into the portion of the authentication that uses the password hash.

When performing PtH, valid password hashes for the account being used are captured using a Credential Access technique. Captured hashes are used with PtH to authenticate as that user. Once authenticated, PtH may be used to perform actions on local or remote systems.

Adversaries may also use stolen password hashes to "overpass the hash." Similar to PtH, this involves using a password hash to authenticate as a user but also uses the password hash to create a valid Kerberos ticket. This ticket can then be used to perform Pass the Ticket attacks.[1]

ID: T1550.002
Sub-technique of:  T1550
Platforms: Windows
Contributors: Blake Strom, Microsoft 365 Defender; Travis Smith, Tripwire
Version: 1.3
Created: 30 January 2020
Last Modified: 24 October 2025

Procedure Examples

ID Name Description
G0006 APT1

The APT1 group is known to have used pass the hash.[2]

G0007 APT28

APT28 has used pass the hash for lateral movement.[3]

G0050 APT32

APT32 has used pass the hash for lateral movement.[4]

G0096 APT41

APT41 uses tools such as Mimikatz to enable lateral movement via captured password hashes.[5]

G0143 Aquatic Panda

Aquatic Panda used a registry edit to enable a Windows feature called RestrictedAdmin in victim environments. This change allowed Aquatic Panda to leverage "pass the hash" mechanisms as the alteration allows for RDP connections with a valid account name and hash only, without possessing a cleartext password value.[6]

S1081 BADHATCH

BADHATCH can perform pass the hash on compromised machines with x64 versions.[7]

G0114 Chimera

Chimera has dumped password hashes for use in pass the hash authentication attacks.[8]

S0154 Cobalt Strike

Cobalt Strike can perform pass the hash.[9]

S0488 CrackMapExec

CrackMapExec can pass the hash to authenticate via SMB.[10]

G1003 Ember Bear

Ember Bear has used pass-the-hash techniques for lateral movement in victim environments.[11]

S0363 Empire

Empire can perform pass the hash attacks.[12]

G1016 FIN13

FIN13 has used the PowerShell utility Invoke-SMBExec to execute the pass the hash method for lateral movement within an compromised environment.[13]

G0093 GALLIUM

GALLIUM used dumped hashes to authenticate to other machines via pass the hash.[14]

S0376 HOPLIGHT

HOPLIGHT has been observed loading several APIs associated with Pass the Hash.[15]

G0094 Kimsuky

Kimsuky has used pass the hash for authentication to remote access software used in C2.[16]

S0002 Mimikatz

Mimikatz's SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands.[17][18][19]

C0002 Night Dragon

During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers.[20]

S0122 Pass-The-Hash Toolkit

Pass-The-Hash Toolkit can perform pass the hash.[2]

S0378 PoshC2

PoshC2 has a number of modules that leverage pass the hash for lateral movement.[21]

G0102 Wizard Spider

Wizard Spider has used the Invoke-SMBExec PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally.[22]

Mitigations

ID Mitigation Description
M1026 Privileged Account Management

Limit credential overlap across systems to prevent the damage of credential compromise and reduce the adversary's ability to perform Lateral Movement between systems.

M1051 Update Software

Apply patch KB2871997 to Windows 7 and higher systems to limit the default access of accounts in the local administrator group.[23]

M1052 User Account Control

Enable pass the hash mitigations to apply UAC restrictions to local accounts on network logon. The associated Registry key is located HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy.

Through GPO: Computer Configuration > [Policies] > Administrative Templates > SCM: Pass the Hash Mitigations: Apply UAC restrictions to local accounts on network logons.[24]

M1018 User Account Management

Do not allow a domain user to be in the local administrator group on multiple systems.

Detection Strategy

ID Name Analytic ID Analytic Description
DET0409 Detection Strategy for T1550.002 - Pass the Hash (Windows) AN1144

Detects anomalous NTLM LogonType 3 authentications that occur without accompanying domain logon events, especially from lateral systems or involving built-in administrative tools. Monitors for mismatches between source user context and system being accessed. Correlates LogonSession creation, NTLM authentications, and process/service initiation to identify suspicious use of stolen password hashes for remote access or service logon without password entry. Detects overpass-the-hash by combining Kerberos ticket issuance with NTLM-based lateral movement.

References

  1. Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.
  2. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.
  3. US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.
  4. CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.
  5. Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.
  6. The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.
  7. Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.
  8. McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.
  9. Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019.
  10. Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.
  11. National Security Agency/Central Security Service Information Assurance Directorate. (2015, August 7). Spotting the Adversary with Windows Event Log Monitoring. Retrieved September 6, 2018.
  12. NSA IAD. (2017, January 24). MS Security Guide. Retrieved December 18, 2017.