Event ID 5382 — Vault credentials were read.
Description
Vault credentials were read.
Message #
Fields #
| Name | Description |
|---|---|
SubjectUserSid SID | [Subject] Security ID |
SubjectUserName UnicodeString | [Subject] Account Name |
SubjectDomainName UnicodeString | [Subject] Account Domain |
SubjectLogonId HexInt64 | [Subject] Logon ID |
SchemaFriendlyName UnicodeString | — |
Schema GUID | — |
Resource UnicodeString | — |
Identity UnicodeString | — |
PackageSid UnicodeString | — |
Flags UInt32 | — |
ReturnCode UInt32 | — |
ProcessCreationTime FILETIME | — |
ClientProcessId UInt32 | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 5382,
"version": 0,
"level": 0,
"task": 13824,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2023-11-05T22:28:52.690626+00:00",
"event_record_id": 3184,
"correlation": {},
"execution": {
"process_id": 808,
"thread_id": 888
},
"channel": "Security",
"computer": "WinDev2310Eval",
"security": {
"user_id": ""
}
},
"event_data": {
"SubjectUserSid": "S-1-5-18",
"SubjectUserName": "WINDEV2310EVAL$",
"SubjectDomainName": "WORKGROUP",
"SubjectLogonId": "0x3e7",
"SchemaFriendlyName": "NGC Local Accoount Logon Vault Resource Schema",
"Schema": "1D4350A3-330D-4AF9-B3FF-A927A45998AC",
"Resource": "NGC Local Accoount Logon Vault Resource",
"Identity": "010500000000000515000000F15DC676EF81AF629C157803E8030000",
"PackageSid": "",
"Flags": 0,
"ReturnCode": 1168,
"ProcessCreationTime": "2023-11-05T22:28:52.050339Z",
"ClientProcessId": 4612
},
"message": ""
}
Detection Rules #
View all rules referencing this event →
Elastic # view in reference
- Multiple Vault Web Credentials Read source medium: Windows Credential Manager allows you to create, view, or delete saved credentials for signing into websites, connected applications, and networks. An adversary may abuse this to list or dump credentials stored in the Credential Manager for saved usernames and passwords. This may also be performed in preparation of lateral movement.
References #
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-user-account-management
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=5382
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx