heroui logo

Windows Credentials from Password Stores Deletion

Splunk Security Content

View Source
Summary
This detection rule identifies suspicious behavior related to the execution of the Windows command-line tool `cmdkey.exe` with the `/delete` parameter. Cmdkey.exe is used for managing stored credentials, and by deleting stored credentials, attackers can facilitate unauthorized access or privilege escalation. This rule monitors process execution logs from EDR solutions by leveraging Sysmon and Windows Event Logs to flag any instances of cmdkey.exe being executed with the delete command. The identification of such events is crucial as they can indicate malicious intentions to erase user credentials, complicating incident response and allowing attackers to maintain persistence on compromised systems.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1555
Created: 2024-12-10