Windows Event ID 4648 — Logon with Explicit Credentials
Logged when a process attempts to authenticate using explicitly provided credentials — e.g. runas, net use, or Pass-the-Hash attacks.
MITRE ATT&CK
T1550.002 · Pass the Hash
Lateral Movement
Why It Matters
Attackers who have stolen credentials use explicit-credential logons to move laterally without logging into a new interactive session. High volumes of 4648, especially from LSASS or unusual processes, are a strong lateral movement indicator.
Key Fields
Investigation Tips
- 1.Look for 4648 where the Subject and Credentials Used accounts differ — this is explicit credential use.
- 2.Correlate with 4624 Type 3 on the target system to confirm successful lateral movement.
- 3.runas.exe in the process name is normal admin activity; powershell.exe or cmd.exe are more suspicious.
Related Event IDs
Full Detection Guide Available
This event ID has a full detection guide with investigation steps, remediation advice, and example log entries.
View full guide for Event ID 4648 →See Event ID 4648 in your logs
Upload a Windows Event Log (.evtx) file — EventPeeker automatically detects logon with explicit credentials patterns, maps findings to MITRE ATT&CK, and generates an AI triage report.
Analyze EVTX Logs Free →