Detection rules › Sigma
CredUI.DLL Loaded By Uncommon Process
Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Credential Access | T1056.002 Input Capture: GUI Input Capture |
| Collection | T1056.002 Input Capture: GUI Input Capture |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 7 | Image loaded |
Stages and Predicates
Stage 1: selection
or:
ImageLoaded|endswith: '\credui.dll'
ImageLoaded|endswith: '\wincredui.dll'
OriginalFileName: credui.dll
OriginalFileName: wincredui.dll
Stage 2: not 1 of filter_main_*
or:
Image: 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe'
Image: 'C:\Windows\explorer.exe'
Image: 'C:\Windows\regedit.exe'
Image|startswith: 'C:\Program Files (x86)\'
Image|startswith: 'C:\Program Files\'
Image|startswith: 'C:\Windows\SysWOW64\'
Image|startswith: 'C:\Windows\System32\'
Image|startswith: 'C:\Windows\SystemApps\'
Stage 3: not 1 of filter_optional_*
or:
Image|endswith: '\Teams.exe'
Image|contains: '\AppData\Local\Microsoft\Teams\'
Image|startswith: 'C:\Users\'
Image|contains: '\AppData\Local\Microsoft\OneDrive\'
Image|startswith: 'C:\Users\'
Image|endswith: '\opera_autoupdate.exe'
Image|endswith: '\procexp.exe'
Image|endswith: '\procexp64.exe'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Image | ends_with |
|
Image | eq |
|
Image | match |
|
Image | starts_with |
|
ImageLoaded | ends_with |
|
OriginalFileName | eq |
|