


NET compiled module named exchgrabber to enumerate credentials from the Credential Manager. Turla has gathered credentials from the Windows Credential Manager tool. Stealth Falcon malware gathers passwords from the Windows Credential Vault. SILENTTRINITY can gather Windows Vault credentials. ROKRAT can steal credentials by leveraging the Windows Vault mechanism. RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials. PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using vaultcmd.exe and another that can collect RDP access credentials using the CredEnumerateW function. LaZagne can obtain credentials from Vault files. KGH_SPY can collect credentials from the Windows Credential Manager. Password recovery tools may also obtain plain text passwords from the Credential Manager. Credential backups and restorations may be performed by running rundll32.exe keymgr.dll KRShowKeyMgr then selecting the "Back up." button on the "Stored User Names and Passwords" GUI. Īdversaries may also obtain credentials from credential backups.

Windows APIs, such as CredEnumerateA, may also be absued to list credentials managed by the Credential Manager. Adversaries may also gather credentials by directly reading files located inside of the Credential Lockers. vaultcmd.exe is a native Windows executable that can be used to enumerate credentials stored in the Credential Locker through a command-line interface. Īdversaries may list credentials managed by the Windows Credential Manager through several mechanisms. The encryption key can be found in a file named Policy.vpol, typically located in the same folder as the credentials. vcrd files, located under %Systemdrive%\Users\\\AppData\Local\Microsoft\\\. Application and network credentials are stored in the Windows Credentials locker.Ĭredential Lockers store credentials in encrypted. As part of Credentials from Web Browsers, Internet Explorer and Microsoft Edge website credentials are managed by the Credential Manager and are stored in the Web Credentials locker. The Windows Credential Manager separates website credentials from application or network credentials in two lockers. The Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through NTLM or Kerberos in Credential Lockers (previously known as Windows Vaults). Adversaries may acquire credentials from the Windows Credential Manager.
