heroui logo

WDigest Forced Credential Caching

Anvilogic Forge

View Source
Summary
The detection rule "WDigest Forced Credential Caching" focuses on monitoring changes to the WDigest registry setting, which is part of Windows authentication protocols. WDigest, being a legacy protocol, can store sensitive credentials in memory, enabling potential attacks where threat actors can harvest plaintext passwords if the feature is turned on. This rule specifically tracks commands that modify the registry key associated with WDigest, particularly changes to the 'UseLogonCredential' setting. Identifying such modifications is crucial because they signal an attempt to enable credential caching, which could be leveraged by attackers to access cached domain credentials. By analyzing the commands associated with this registry change, the rule aims to detect potential credential theft activities within an endpoint environment, relying on endpoint detection and response (EDR) data collections. The logic for detection utilizes a Splunk query that aggregates the relevant events for analysis, helping in proactive monitoring for credential exploitation attempts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1112
  • T1003.005
Created: 2024-02-09