Windows Credential Manager
Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for signing into websites, applications, and devices that request authentication through NTLM or Kerberos in Credential Lockers (previously known as Windows Vaults). Credentials are stored as encrypted .vcrd files under %Systemdrive%\Users\[Username]\AppData\Local\Microsoft\[Vault/Credentials]\. Adversaries may enumerate credentials via vaultcmd.exe, cmdkey.exe, Windows APIs (CredEnumerateA), or extract credential backups via rundll32.exe keymgr.dll KRShowKeyMgr. Tools like Mimikatz (vault::cred, vault::list) and PowerSploit can also harvest Credential Manager contents.
let VaultCommands = dynamic(["vaultcmd /listcreds", "vaultcmd /list", "cmdkey /list", "rundll32.exe keymgr.dll", "KRShowKeyMgr", "Invoke-WCMDump", "vault::cred", "vault::list", "dpapi::cred", "CredEnumerateA", "CredEnumerateW", "Get-VaultCredential"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (VaultCommands)
or (FileName =~ "vaultcmd.exe" and ProcessCommandLine has_any ("/listcreds", "/list"))
or (FileName =~ "cmdkey.exe" and ProcessCommandLine has "/list")
or (FileName =~ "rundll32.exe" and ProcessCommandLine has "keymgr.dll")
| extend VaultEnum = ProcessCommandLine has_any ("vaultcmd", "vault::list")
| extend CmdkeyEnum = ProcessCommandLine has "cmdkey /list"
| extend MimikatzVault = ProcessCommandLine has_any ("vault::cred", "dpapi::cred")
| extend CredBackup = ProcessCommandLine has "keymgr.dll"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine,
VaultEnum, CmdkeyEnum, MimikatzVault, CredBackup
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- System administrators using cmdkey /list to audit stored credentials during troubleshooting
- IT helpdesk scripts that check credential store status for remote access configuration
- Endpoint management tools that enumerate credentials as part of compliance checks
- Windows system processes that interact with Credential Manager during authentication flows
References (6)
- https://attack.mitre.org/techniques/T1555/004/
- https://blog.malwarebytes.com/101/2016/01/the-windows-vaults/
- https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials
- https://docs.microsoft.com/en-us/windows/win32/api/wincred/nf-wincred-credenumeratea
- https://www.passcape.com/windows_password_recovery_vault_explorer
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1555.004/T1555.004.md
Unlock Pro Content
Get the full detection package for T1555.004 including response playbook, investigation guide, and atomic red team tests.