
Summary
The 'Windows Password Managers Discovery' detection rule is designed to identify suspicious command-line activities that indicate potential unauthorized attempts to discover files associated with password manager applications, such as those containing '*.kdbx*' or '*credential*'. This detection leverages logs from Endpoint Detection and Response (EDR) solutions like Sysmon and Windows Event Log for process execution events. The motive behind this detection is based on the understanding that attackers often seek to exploit stored credentials in password managers, which could lead to privilege escalations, lateral movement within networks, or critical data exfiltration. Implementing this rule requires ingestion of logging data from EDR agents, specifically focused on command-line executions for relevant process searches. This detection plays a crucial role in protecting sensitive information stored in these applications by alerting on potential reconnaissance activities performed by attackers.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1555
- T1555.005
Created: 2024-11-13