
Summary
This detection rule identifies potential threats associated with credential theft by monitoring access to the Windows Credential Manager and vault. The rule looks for process names and file locations in user directories that are not typically associated with legitimate applications but may instead indicate the use of credential-stealing tools such as Mimikatz. It specifically targets access to files located within the `AppData` and `ProgramData` directories that are indicative of unauthorized or suspicious activity. The detection mechanism distinguishes these accesses by filtering out processes originating from standard system directories, thus reducing false positives. If a process not originating from a common system folder attempts to access the Credential Manager files, it raises an alert, highlighting a potential security breach that could involve credential harvesting.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2022-10-11