Stored credentials exported using credwiz.exe

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Credentials from Password Stores (T1555)

Severity

Low

Description

Attackers may abuse the credwiz tool to export stored accounts.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.

Variations

Stored credentials exported using credwiz.exe using keymgr.dll's KRShowKeyMgr function

Synopsis

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Credentials from Password Stores (T1555)

Severity

Medium

Description

Attackers may abuse the credwiz tool to export stored accounts using keymgr.dll's KRShowKeyMgr function.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.


Stored credentials exported using credwiz.exe over RDP

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

Attackers may abuse the credwiz tool to export stored accounts over RDP.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.


Stored credentials exported using credwiz.exe with a built-in Windows tool

Synopsis

ATT&CK Tactic

Credential Access (TA0006)

ATT&CK Technique

Credentials from Password Stores (T1555)

Severity

Low

Description

Attackers may abuse the credwiz tool to export stored accounts with a built-in Windows tool.

Attacker's Goals

An attacker may attempt to gain higher privileges.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.