heroui logo

Enumeration for 3rd Party Creds From CLI

Sigma Rules

View Source
Summary
This detection rule is designed to monitor and identify processes on Windows systems that query specific registry keys associated with various third-party applications that store credentials. Utilizing command line arguments, the rule flags any activity where the command line execution contains references to known registry paths where sensitive information, such as user passwords or authentication tokens, could be exposed or extracted. The detection leverages the 'process_creation' log source category to track these commands, ensuring that administrators can promptly respond to potential security breaches involving unauthorized access to stored credentials. Given the nature of the detection, it primarily targets credential access threats as part of a broader security strategy.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-06-20