Skip to content

Commit 9318bb6

Browse files
committed
refactor(rules): Improve Credential discovery via VaultCmd tool rule
Make the rule more resistant to evasion by checking the original process executable name and also performing case-insensitive match on the command line.
1 parent 03532e9 commit 9318bb6

File tree

1 file changed

+9
-10
lines changed

1 file changed

+9
-10
lines changed
Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
1-
name: Credential discovery via VaultCmd.exe
1+
name: Credential discovery via VaultCmd tool
22
id: 2ce607d3-5a14-4628-be8a-22bcde97dab5
3-
version: 1.0.1
3+
version: 1.1.0
44
description: |
5-
Detects the usage of the VaultCmd tool to list Windows Credentials.
6-
VaultCmd creates, displays and deletes stored credentials.
5+
Detects the usage of the VaultCmd tool to list Windows Credentials. VaultCmd creates,
6+
displays and deletes stored credentials. An adversary may abuse this to list or dump
7+
credentials stored in the Credential Manager.
78
labels:
89
tactic.id: TA0006
910
tactic.name: Credential Access
@@ -16,12 +17,10 @@ labels:
1617
subtechnique.ref: https://attack.mitre.org/techniques/T1555/004/
1718

1819
condition: >
19-
spawn_process and ps.child.name ~= 'VaultCmd.exe'
20+
spawn_process and (ps.child.name ~= 'VaultCmd.exe' or ps.child.pe.file.name ~= 'vaultcmd.exe')
2021
and
21-
ps.child.args in
22-
(
23-
'"/listcreds:Windows Credentials"',
24-
'"/listcreds:Web Credentials"'
25-
)
22+
ps.child.cmdline imatches '*/list*'
23+
24+
severity: medium
2625

2726
min-engine-version: 2.0.0

0 commit comments

Comments
 (0)