T1555.004

Windows Credential Manager

Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for signing into websites, applications, and devices that request authentication through NTLM or Kerberos in Credential Lockers (previously known as Windows Vaults). Credentials are stored as encrypted .vcrd files under %Systemdrive%\Users\[Username]\AppData\Local\Microsoft\[Vault/Credentials]\. Adversaries may enumerate credentials via vaultcmd.exe, cmdkey.exe, Windows APIs (CredEnumerateA), or extract credential backups via rundll32.exe keymgr.dll KRShowKeyMgr. Tools like Mimikatz (vault::cred, vault::list) and PowerSploit can also harvest Credential Manager contents.

Microsoft Sentinel / Defender
kusto
let VaultCommands = dynamic(["vaultcmd /listcreds", "vaultcmd /list", "cmdkey /list", "rundll32.exe keymgr.dll", "KRShowKeyMgr", "Invoke-WCMDump", "vault::cred", "vault::list", "dpapi::cred", "CredEnumerateA", "CredEnumerateW", "Get-VaultCredential"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (VaultCommands)
    or (FileName =~ "vaultcmd.exe" and ProcessCommandLine has_any ("/listcreds", "/list"))
    or (FileName =~ "cmdkey.exe" and ProcessCommandLine has "/list")
    or (FileName =~ "rundll32.exe" and ProcessCommandLine has "keymgr.dll")
| extend VaultEnum = ProcessCommandLine has_any ("vaultcmd", "vault::list")
| extend CmdkeyEnum = ProcessCommandLine has "cmdkey /list"
| extend MimikatzVault = ProcessCommandLine has_any ("vault::cred", "dpapi::cred")
| extend CredBackup = ProcessCommandLine has "keymgr.dll"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         VaultEnum, CmdkeyEnum, MimikatzVault, CredBackup
| sort by Timestamp desc
high severity high confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • System administrators using cmdkey /list to audit stored credentials during troubleshooting
  • IT helpdesk scripts that check credential store status for remote access configuration
  • Endpoint management tools that enumerate credentials as part of compliance checks
  • Windows system processes that interact with Credential Manager during authentication flows

Unlock Pro Content

Get the full detection package for T1555.004 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections