
Summary
This detection rule identifies the access and enumeration of credentials stored in the Windows Credential Manager using the VaultCmd utility, specifically through its process creation events. It focuses on processes that match the image name 'VaultCmd.exe' or its original filename. Credential enumeration often indicates malicious intent or unauthorized access to security-sensitive information. By monitoring command-line usage for VaultCmd, particularly when it includes the argument '/listcreds:', the rule is set to trigger an alert when these conditions are met. This makes it effective at detecting potential credential theft or misuse events in a Windows environment.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1555.004
Created: 2022-04-08