heroui logo

Access To Windows Credential History File By Uncommon Applications

Sigma Rules

View Source
Summary
This detection rule aims to identify attempts by uncommon applications to access the Windows Credential History file, specifically located at '\Microsoft\Protect\CREDHIST'. Such access requests are suspicious as they may indicate malicious activities aimed at credential theft. Tools like Mimikatz can exploit this vulnerability using its 'dpapi::credhist' function to extract sensitive information. The rule employs conditions that exclude standard system applications and locations, focusing on identifying non-standard applications that might engage in such illicit access. This proactive monitoring is crucial for detecting potential breaches of user credentials before significant damage occurs.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • File
Created: 2022-10-17