Microsoft-Windows-Security-Auditing › Event 5381

Event ID 5381 — Vault credentials were read.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

Vault credentials were read.

Message #

Vault credentials were read.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user enumerates stored vault credentials.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Flags UInt32
CountOfCredentialsReturned UInt32
ProcessCreationTime FILETIME
ClientProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5381,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-09-24T20:05:50.571779+00:00",
    "event_record_id": 150026,
    "correlation": {},
    "execution": {
      "process_id": 804,
      "thread_id": 5636
    },
    "channel": "Security",
    "computer": "GUAPOS-PC",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-3960598978-2723104146-531989891-1001",
    "SubjectUserName": "FOXTWO",
    "SubjectDomainName": "GUAPOS-PC",
    "SubjectLogonId": 894283,
    "Flags": 0,
    "CountOfCredentialsReturned": 1,
    "ProcessCreationTime": 1664049942.3177185,
    "ClientProcessId": 10620
  },
  "message": "Vault credentials were read.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\nThis event occurs when a user enumerates stored vault credentials."
}

References #