Skip to content

Commit 6fb1d1f

Browse files
committed
feat(rules): Add Credential Manager access via known tools rule
Detects access to the Windows Credential Manager using built-in utilities such as vaultcmd.exe, cmdkey.exe, rundll32.exe, and control.exe. Adversaries can abuse these native tools to enumerate or interact with stored credentials.
1 parent 1ccb7b3 commit 6fb1d1f

3 files changed

+31
-48
lines changed

rules/credential_access_credential_access_from_backups_via_rundll32.yml

Lines changed: 0 additions & 22 deletions
This file was deleted.

rules/credential_access_credential_discovery_via_vaultcmd.yml

Lines changed: 0 additions & 26 deletions
This file was deleted.
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
name: Credential Manager access via known tools
2+
id: 5b4130f8-bc73-4890-b5f6-b03cddc75a52
3+
version: 1.0.0
4+
description: |
5+
Detects access to the Windows Credential Manager using built-in
6+
utilities such as vaultcmd.exe, cmdkey.exe, rundll32.exe, and
7+
control.exe. Adversaries can abuse these native tools to enumerate
8+
or interact with stored credentials.
9+
labels:
10+
tactic.id: TA0006
11+
tactic.name: Credential Access
12+
tactic.ref: https://attack.mitre.org/tactics/TA0006/
13+
technique.id: T1003
14+
technique.name: OS Credential Dumping
15+
technique.ref: https://attack.mitre.org/techniques/T1003/
16+
subtechnique.id: T1003.002
17+
subtechnique.name: Security Account Manager
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1003/002/
19+
20+
condition: >
21+
spawn_process and
22+
((ps.name ~= 'VaultCmd.exe' or ps.pe.file.name ~= 'vaultcmd.exe') and ps.cmdline imatches '*/list*') or
23+
((ps.name ~= 'rundll32.exe' or ps.pe.file.name ~= 'rundll32.exe') and ps.cmdline imatches '*keymgr.dll*KRShowKeyMgr*') or
24+
((ps.name ~= 'cmdkey.exe' or ps.pe.file.name ~= 'cmdkey.exe') and ps.cmdline imatches '*/list*') or
25+
((ps.name ~= 'control.exe' or ps.pe.file.name ~= 'control.exe') and ps.cmdline imatches '*keymgr.dll*')
26+
27+
output: >
28+
Access to credential manager via process %ps.exe
29+
severity: medium
30+
31+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)