heroui logo

Suspicious Key Manager Access

Sigma Rules

View Source
Summary
The 'Suspicious Key Manager Access' rule is designed to detect potentially unauthorized access to sensitive user credentials stored on a Windows system. Specifically, it monitors for the invocation of the Stored User Names and Passwords dialogue, commonly referred to as Key Manager, which can be indicative of credential theft attempts or unauthorized access to sensitive data. The rule looks for the execution of 'rundll32.exe' with specific command line arguments, particularly those that reference 'keymgr' or 'KRShowKeyMgr'. These command lines are associated with the display of stored credentials and could indicate malicious activity if used out of context. Detection relies on process creation logs and targets the Windows environment, emphasizing the importance of monitoring for such potentially dangerous command executions. Given the high level of risk associated with credential access attempts, any alerts generated by this rule should be investigated promptly to determine if the access is legitimate or warrants further security measures.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-04-21