Rule Library

Sigma Rules

382 rules found for "credential-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Potential SysInternals ProcDump Evasion

Detects uses of the SysInternals ProcDump utility in which ProcDump or its output get renamed, or a dump file is moved or copied to a different name

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Tue Jan 11windows
Detectionhighstable

Potential LSASS Process Dump Via Procdump

Detects potential credential harvesting attempts through LSASS memory dumps using ProcDump. This rule identifies suspicious command-line patterns that combine memory dump flags (-ma, -mm, -mp) with LSASS-related process markers. LSASS (Local Security Authority Subsystem Service) contains sensitive authentication data including plaintext passwords, NTLM hashes, and Kerberos tickets in memory. Attackers commonly dump LSASS memory to extract credentials for lateral movement and privilege escalation.

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingTA0006 · Credential AccessT1003.001 · LSASS Memory+1
Florian Roth (Nextron Systems)Tue Oct 30windows
Detectionmediumtest

Loaded Module Enumeration Via Tasklist.EXE

Detects the enumeration of a specific DLL or EXE being used by a binary via "tasklist.exe". This is often used by attackers in order to find the specific process identifier (PID) that is using the DLL in question. In order to dump the process memory or perform other nefarious actions.

WindowsProcess Creation
T1003 · OS Credential DumpingTA0006 · Credential Access
Swachchhanda Shrawan PoudelMon Feb 12windows
Detectionmediumtest

Potentially Suspicious Command Targeting Teams Sensitive Files

Detects a commandline containing references to the Microsoft Teams database or cookies files from a process other than Teams. The database might contain authentication tokens and other sensitive information about the logged in accounts.

WindowsProcess Creation
TA0006 · Credential AccessT1528 · Steal Application Access Token
@serkinvaleryFri Sep 16windows
Detectionmediumtest

Windows Credential Manager Access via VaultCmd

List credentials currently stored in Windows Credential Manager via the native Windows utility vaultcmd.exe

WindowsProcess Creation
TA0006 · Credential AccessT1555.004 · Windows Credential Manager
François HubautFri Apr 08windows
Detectionhightest

Sensitive File Dump Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhightest

Sensitive File Recovery From Backup Via Wbadmin.EXE

Detects the dump of highly sensitive files such as "NTDS.DIT" and "SECURITY" hive. Attackers can leverage the "wbadmin" utility in order to dump sensitive files that might contain credential or sensitive information.

WindowsProcess Creation
TA0006 · Credential AccessT1003.003 · NTDS
Nasreddine Bencherchali (Nextron Systems)+1Fri May 10windows
Detectionhighexperimental

PPL Tampering Via WerFaultSecure

Detects potential abuse of WerFaultSecure.exe to dump Protected Process Light (PPL) processes like LSASS or to freeze security solutions (EDR/antivirus). This technique is used by tools such as EDR-Freeze and WSASS to bypass PPL protections and access sensitive information or disable security software. Distinct command line patterns help identify the specific tool: - WSASS usage typically shows: "WSASS.exe WerFaultSecure.exe [PID]" in ParentCommandLine - EDR-Freeze usage typically shows: "EDR-Freeze_[version].exe [PID] [timeout]" in ParentCommandLine Legitimate debugging operations using WerFaultSecure are rare in production environments and should be investigated.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify ToolsTA0006 · Credential AccessT1003.001 · LSASS Memory
Jason (https://github.com/0xbcf)Tue Sep 23windows
Detectionhightest

Potential Credential Dumping Via WER

Detects potential credential dumping via Windows Error Reporting LSASS Shtinkering technique which uses the Windows Error Reporting to dump lsass

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
@pbssubhash+1Thu Dec 08windows
Detectionhightest

Esentutl Volume Shadow Copy Service Keys

Detects the volume shadow copy service initialization and processing via esentutl. Registry keys such as HKLM\\System\\CurrentControlSet\\Services\\VSS\\Diag\\VolSnap\\Volume are captured.

WindowsRegistry Event
TA0006 · Credential AccessT1003.002 · Security Account Manager
Roberto Rodriguez (Cyb3rWard0g)+1Tue Oct 20windows
Detectioncriticaltest

Windows Credential Editor Registry

Detects the use of Windows Credential Editor (WCE)

WindowsRegistry Event
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0005 · S0005
Florian Roth (Nextron Systems)Tue Dec 31windows
Detectioncriticaltest

Potential Credential Dumping Via LSASS SilentProcessExit Technique

Detects changes to the Registry in which a monitor program gets registered to dump the memory of the lsass.exe process

WindowsRegistry Event
TA0006 · Credential AccessT1003.001 · LSASS Memory
Florian Roth (Nextron Systems)Fri Feb 26windows
Detectionhightest

Directory Service Restore Mode(DSRM) Registry Value Tampering

Detects changes to "DsrmAdminLogonBehavior" registry value. During a Domain Controller (DC) promotion, administrators create a Directory Services Restore Mode (DSRM) local administrator account with a password that rarely changes. The DSRM account is an “Administrator” account that logs in with the DSRM mode when the server is booting up to restore AD backups or recover the server from a failure. Attackers could abuse DSRM account to maintain their persistence and access to the organization's Active Directory. If the "DsrmAdminLogonBehavior" value is set to "0", the administrator account can only be used if the DC starts in DSRM. If the "DsrmAdminLogonBehavior" value is set to "1", the administrator account can only be used if the local AD DS service is stopped. If the "DsrmAdminLogonBehavior" value is set to "2", the administrator account can always be used.

WindowsRegistry Set
TA0005 · Defense EvasionTA0006 · Credential AccessTA0003 · PersistenceT1556 · Modify Authentication Process
Nischal KhadgiThu Jul 11windows
Detectionhightest

Lsass Full Dump Request Via DumpType Registry Settings

Detects the setting of the "DumpType" registry value to "2" which stands for a "Full Dump". Technique such as LSASS Shtinkering requires this value to be "2" in order to dump LSASS.

WindowsRegistry Set
TA0006 · Credential AccessT1003.001 · LSASS Memory
@pbssubhashThu Dec 08windows
Detectionmediumtest

Potential Credential Dumping Attempt Using New NetworkProvider - REG

Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it

WindowsRegistry Set
TA0006 · Credential AccessT1003 · OS Credential Dumping
Nasreddine Bencherchali (Nextron Systems)Tue Aug 23windows
Detectionhightest

Potentially Suspicious ODBC Driver Registered

Detects the registration of a new ODBC driver where the driver is located in a potentially suspicious location

WindowsRegistry Set
TA0006 · Credential AccessTA0003 · PersistenceT1003 · OS Credential Dumping
Nasreddine Bencherchali (Nextron Systems)Tue May 23windows
Emerging Threatcriticaltest

NotPetya Ransomware Activity

Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil

WindowsProcess Creation
TA0005 · Defense EvasionT1218.011 · Rundll32T1070.001 · Clear Windows Event LogsTA0006 · Credential Access+3
Florian Roth (Nextron Systems)+1Wed Jan 162017
Emerging Threatcriticaltest

APT31 Judgement Panda Activity

Detects APT31 Judgement Panda activity as described in the Crowdstrike 2019 Global Threat Report

WindowsProcess Creation
TA0009 · CollectionTA0008 · Lateral MovementTA0006 · Credential AccessG0128 · GOLD SOUTHFIELD+3
Florian Roth (Nextron Systems)Thu Feb 212019
Emerging Threatcriticalstable

Potential Russian APT Credential Theft Activity

Detects Russian group activity as described in Global Threat Report 2019 by Crowdstrike

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In FilesT1003.003 · NTDSdetection.emerging-threats
Florian Roth (Nextron Systems)Thu Feb 212019
Emerging Threathightest

GALLIUM IOCs

Detects artifacts associated with GALLIUM cyber espionage group as reported by Microsoft Threat Intelligence Center in the December 2019 report.

WindowsProcess Creation
TA0006 · Credential AccessTA0011 · Command and ControlT1212 · Exploitation for Credential AccessT1071 · Application Layer Protocol+2
Tim BurrellFri Feb 072020
Emerging Threathightest

GALLIUM Artefacts - Builtin

Detects artefacts associated with activity group GALLIUM - Microsoft Threat Intelligence Center indicators released in December 2019.

Windowsdns-server-analytic
TA0006 · Credential AccessTA0011 · Command and ControlT1071 · Application Layer Protocoldetection.emerging-threats
Tim BurrellFri Feb 072020
Emerging Threatcriticaltest

CVE-2021-31979 CVE-2021-33771 Exploits by Sourgum

Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum

WindowsFile Event
TA0001 · Initial AccessTA0002 · ExecutionTA0006 · Credential AccessT1566 · Phishing+4
Sittikorn SFri Jul 162021
Emerging Threatcriticaltest

CVE-2021-31979 CVE-2021-33771 Exploits

Detects patterns as noticed in exploitation of Windows CVE-2021-31979 CVE-2021-33771 vulnerability and DevilsTongue malware by threat group Sourgum

WindowsRegistry Set
TA0001 · Initial AccessTA0002 · ExecutionTA0006 · Credential AccessT1566 · Phishing+4
Sittikorn S+1Fri Jul 162021
Emerging Threatmediumtest

Potential CVE-2021-42278 Exploitation Attempt

The attacker creates a computer object using those permissions with a password known to her. After that she clears the attribute ServicePrincipalName on the computer object. Because she created the object (CREATOR OWNER), she gets granted additional permissions and can do many changes to the object.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoastingcve.2021-42278detection.emerging-threats
François HubautWed Dec 152021
Emerging Threatmediumtest

Potential CVE-2021-42287 Exploitation Attempt

The attacker creates a computer object using those permissions with a password known to her. After that she clears the attribute ServicePrincipalName on the computer object. Because she created the object (CREATOR OWNER), she gets granted additional permissions and can do many changes to the object.

Windowssystem
TA0006 · Credential AccessT1558.003 · Kerberoastingdetection.emerging-threatscve.2021-42287
François HubautWed Dec 152021
Emerging Threatcriticaltest

CVE-2023-23397 Exploitation Attempt

Detects outlook initiating connection to a WebDAV or SMB share, which could be a sign of CVE-2023-23397 exploitation.

Windowssecurity
TA0006 · Credential AccessTA0001 · Initial Accesscve.2023-23397detection.emerging-threats
Robert LeeThu Mar 162023
Emerging Threatmediumtest

Okta 2023 Breach Indicator Of Compromise

Detects new user account creation or activation with specific names related to the Okta Support System 2023 breach. This rule can be enhanced by filtering out known and legitimate username used in your environnement.

Oktaokta
TA0006 · Credential Accessdetection.emerging-threats
Muhammad FaisalWed Oct 252023
Emerging Threatmediumexperimental

Suspicious Creation of .library-ms File — Potential CVE-2025-24054 Exploit

Detects creation of '.library-ms' files, which may indicate exploitation of CVE-2025-24054. This vulnerability allows an attacker to trigger an automatic outbound SMB or WebDAV authentication request to a remote server upon archive extraction. If the system is unpatched, no user interaction is required beyond extracting a malicious archive—potentially exposing the user's NTLMv2-SSP hash to the attacker.

WindowsFile Event
detection.emerging-threatsTA0006 · Credential AccessT1187 · Forced Authenticationcve.2025-24054
Gene KazimiarovichSun Apr 202025
Emerging Threathighexperimental

Shai-Hulud Malicious GitHub Workflow Creation

Detects creation of shai-hulud-workflow.yml file associated with Shai Hulud worm targeting NPM supply chain attack that exfiltrates GitHub secrets

LinuxFile Event
TA0003 · PersistenceTA0006 · Credential AccessT1552.001 · Credentials In FilesTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 242025
Threat Huntlowtest

Okta Password Health Report Query

Detects all activities against the endpoint "/reports/password-health/*" which should only be accessed via OKTA Admin Console UI. Use this rule to hunt for potential suspicious requests. Correlate this event with "admin console" login and alert on requests without any corresponding admin console login

Oktaokta
TA0006 · Credential Accessdetection.threat-hunting
Muhammad FaisalWed Oct 25cloud
Threat Huntmediumtest

Clipboard Data Collection Via Pbpaste

Detects execution of the "pbpaste" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout). The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands. It can also be used in shell scripts that may require clipboard content as input. Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information. Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1115 · Clipboard Datadetection.threat-hunting
Daniel CortezTue Jul 30macos
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications - Security

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing This rule requires heavy baselining before usage.

Windowssecurity
TA0006 · Credential AccessT1555.003 · Credentials from Web Browsersdetection.threat-hunting
Daniel Koifman+1Mon Oct 21windows
Threat Huntlowtest

Access To Chromium Browsers Sensitive Files By Uncommon Applications

Detects file access requests to chromium based browser sensitive files by uncommon processes. Could indicate potential attempt of stealing sensitive information.

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
X__Junior (Nextron Systems)Mon Jul 29windows
Threat Huntlowtest

Access To Browser Credential Files By Uncommon Applications

Detects file access requests to browser credential stores by uncommon processes. Could indicate potential attempt of credential stealing. Requires heavy baselining before usage

Windowsfile_access
T1003 · OS Credential DumpingTA0006 · Credential Accessdetection.threat-hunting
François Hubaut+1Sat Apr 09windows
Threat Huntmediumtest

Access To Sysvol Policies Share By Uncommon Process

Detects file access requests to the Windows Sysvol Policies Share by uncommon processes

Windowsfile_access
TA0006 · Credential AccessT1552.006 · Group Policy Preferencesdetection.threat-hunting
François HubautThu Dec 21windows
Threat Huntlowtest

Unattend.XML File Access Attempt

Detects attempts to access the "unattend.xml" file, where credentials might be stored. This file is used during the unattended windows install process.

Windowsfile_access
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
François HubautMon Jul 22windows
Threat Huntlowtest

PFX File Creation

Detects the creation of PFX files (Personal Information Exchange format). PFX files contain private keys and certificates bundled together, making them valuable targets for attackers seeking to: - Exfiltrate digital certificates for impersonation or signing malicious code - Establish persistent access through certificate-based authentication - Bypass security controls that rely on certificate validation Analysts should investigate PFX file creation events by examining which process created the PFX file and its parent process chain, as well as unusual locations outside standard certificate stores or development environments.

WindowsFile Event
TA0006 · Credential AccessT1552.004 · Private Keysdetection.threat-hunting
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02windows
Threat Huntmediumtest

Dbghelp/Dbgcore DLL Loaded By Uncommon/Suspicious Process

Detects the load of dbghelp/dbgcore DLL by a potentially uncommon or potentially suspicious process. The Dbghelp and Dbgcore DLLs export functions that allow for the dump of process memory. Tools like ProcessHacker, Task Manager and some attacker tradecraft use the MiniDumpWriteDump API found in dbghelp.dll or dbgcore.dll. As an example, SilentTrynity C2 Framework has a module that leverages this API to dump the contents of Lsass.exe and transfer it over the network back to the attacker's machine. Keep in mind that many legitimate Windows processes and services might load the aforementioned DLLs for debugging or other related purposes. Investigate the CommandLine and the Image location of the process loading the DLL.

WindowsImage Load (DLL)
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
Perez Diego+2Sun Oct 27windows
Threat Huntmediumtest

Potential Credential Dumping Attempt Via PowerShell

Detects a PowerShell process requesting access to "lsass.exe", which can be indicative of potential credential dumping attempts

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS Memorydetection.threat-hunting
oscd.community+1Tue Oct 06windows
Threat Huntmediumtest

LSASS Access From Program In Potentially Suspicious Folder

Detects process access to LSASS memory with suspicious access flags and from a potentially suspicious folder

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sat Nov 27windows
Threat Huntmediumtest

Uncommon GrantedAccess Flags On LSASS

Detects process access to LSASS memory with uncommon access flags 0x410 and 0x01410

WindowsProcess Access
TA0006 · Credential AccessT1003.001 · LSASS MemoryS0002 · Mimikatzdetection.threat-hunting
Florian Roth (Nextron Systems)Sun Mar 13windows
Threat Huntmediumtest

Diskshadow Child Process Spawned

Detects any child process spawning from "Diskshadow.exe". This could be due to executing Diskshadow in interpreter mode or script mode and using the "exec" flag to launch other applications.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Harjot SinghFri Sep 15windows
Threat Huntmediumtest

Diskshadow Script Mode Execution

Detects execution of "Diskshadow.exe" in script mode using the "/s" flag. Attackers often abuse "diskshadow" to execute scripts that deleted the shadow copies on the systems. Investigate the content of the scripts and its location.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0002 · Executiondetection.threat-hunting
Ivan Dyachkov+1Wed Oct 07windows
Threat Huntmediumtest

Potential Password Reconnaissance Via Findstr.EXE

Detects command line usage of "findstr" to search for the "passwords" keyword in a variety of different languages

WindowsProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Filesdetection.threat-hunting
Josh NickelsThu May 18windows
Threat Huntmediumtest

EventLog Query Requests By Builtin Utilities

Detect attempts to query the contents of the event log using command line utilities. Attackers use this technique in order to look for sensitive information in the logs such as passwords, usernames, IPs, etc.

WindowsProcess Creation
T1552 · Unsecured CredentialsTA0006 · Credential Accessdetection.threat-hunting
Ali Alwashali+1Mon Nov 20windows
Compliancelowstable

Cleartext Protocol Usage Via Netflow

Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels Ensure that an encryption is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access.

netflow
TA0006 · Credential Access
Alexandr Yampolskyi+1Tue Mar 26other