T1555.005
Password Managers
Adversaries may acquire user credentials from third-party password managers. Password managers are applications designed to store user credentials in an encrypted database, typically accessible after providing a master password. Once the database is unlocked, credentials may be copied to memory. Adversaries may extract the master password or plain-text credentials from memory, brute-force the master password, exploit vulnerabilities (e.g., CVE-2019-3610, CVE-2023-32784 KeePass), or directly exfiltrate password manager database files (.kdbx, .psafe3, .agilekeychain, .1pif) for offline cracking.
Microsoft Sentinel / Defender
kusto
let PMTools = dynamic(["keethief", "keepass2john", "kpcli", "Find-KeePassConfig", "Get-KeePassDatabaseKey", "KeePassHax"]);
let PMFiles = dynamic([".kdbx", ".kdb", ".psafe3", ".agilekeychain", ".1pif", "1Password.sqlite", "KeePass.config.xml", "LastPass.sqlite"]);
let PMProcesses = dynamic(["KeePass.exe", "1Password.exe", "LastPass.exe", "Bitwarden.exe", "Dashlane.exe", "RoboForm.exe"]);
union DeviceProcessEvents, DeviceFileEvents
| where Timestamp > ago(24h)
| extend CmdLine = coalesce(ProcessCommandLine, "")
| extend FilePath = coalesce(FolderPath, "")
| where CmdLine has_any (PMTools)
or FileName has_any (PMTools)
or (FilePath has_any (PMFiles) and InitiatingProcessFileName !in~ (PMProcesses))
| project Timestamp, DeviceName, AccountName, FileName,
CmdLine, FilePath, InitiatingProcessFileName
| sort by Timestamp desc critical severity
high confidence
Data Sources
Process: Process Creation File: File Access Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents DeviceFileEvents
False Positives
- Password manager applications performing legitimate database operations (autosave, sync, backup)
- Cloud sync services (Dropbox, OneDrive) syncing password manager database files
- IT administrators performing authorized password manager database backups
- Password manager browser extensions accessing the database during auto-fill operations
Last updated: 2026-04-13 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1555/005/
- https://github.com/GhostPack/KeeThief
- https://www.ise.io/casestudies/password-manager-hacking/
- https://nvd.nist.gov/vuln/detail/CVE-2023-32784
- https://www.fox-it.com/media/kadlze5c/201912_report_operation_wocao.pdf
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1555.005/T1555.005.md
Unlock Pro Content
Get the full detection package for T1555.005 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance