Event ID 5381 — Vault credentials were read.
Description
Vault credentials were read.
Message #
Fields #
| Name | Description |
|---|---|
SubjectUserSid SID | [Subject] Security ID |
SubjectUserName UnicodeString | [Subject] Account Name |
SubjectDomainName UnicodeString | [Subject] Account Domain |
SubjectLogonId HexInt64 | [Subject] Logon ID |
Flags UInt32 | — |
CountOfCredentialsReturned UInt32 | — |
ProcessCreationTime FILETIME | — |
ClientProcessId UInt32 | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 5381,
"version": 0,
"level": 0,
"task": 13824,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2022-09-24T20:05:50.571779+00:00",
"event_record_id": 150026,
"correlation": {},
"execution": {
"process_id": 804,
"thread_id": 5636
},
"channel": "Security",
"computer": "GUAPOS-PC",
"security": {
"user_id": ""
}
},
"event_data": {
"SubjectUserSid": "S-1-5-21-3960598978-2723104146-531989891-1001",
"SubjectUserName": "FOXTWO",
"SubjectDomainName": "GUAPOS-PC",
"SubjectLogonId": 894283,
"Flags": 0,
"CountOfCredentialsReturned": 1,
"ProcessCreationTime": 1664049942.3177185,
"ClientProcessId": 10620
},
"message": "Vault credentials were read.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\nThis event occurs when a user enumerates stored vault credentials."
}
References #
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-user-account-management
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx