Detection rules › Sigma
New Generic Credentials Added Via Cmdkey.EXE
Detects usage of "cmdkey.exe" to add generic credentials. As an example, this can be used before connecting to an RDP session via command line interface.
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Credential Access | T1003.005 OS Credential Dumping: Cached Domain Credentials |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: all of selection_img
or:
Image|endswith: '\cmdkey.exe'
OriginalFileName: cmdkey.exe
Stage 2: all of selection_cli_generic
CommandLine|contains: ' -g'
Stage 3: all of selection_cli_user
CommandLine|contains: ' -u'
Stage 4: all of selection_cli_password
CommandLine|contains: ' -p'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Image | ends_with |
|
OriginalFileName | eq |
|