VaultCmd.exe

  • File Path: C:\WINDOWS\system32\VaultCmd.exe
  • Description: Vault cmdline Program

Hashes

Type Hash
MD5 54324BEC9270523FAB7FAB47CE70CDD7
SHA1 24253D3D4D588D2232B4EC9418484A38A9B5C4F6
SHA256 62CF87143D183E704AF6C6EB1A73EDA8D9F36497A71BFDD812F232CF01B553D6
SHA384 5F0DC04DC0A7A71674DA14485E261A4E53F2D3BE04B84C458CF0411C6C1A792552CFFDE61CAB188A5A0D8D8DCAD060F2
SHA512 F9B7803D6C6D15099CF7B80528354903F7E7DB345CD90FBBC1F59627EB0D8624197419CE019A01FB632FCB2A1E3EFDF6924218AC3C1CA6A1BBEC607043EF26FE
SSDEEP 384:cHcdzKY0S74r7ukS7cSTxJULCpkfnZ51OQ8HGaBOvxfbzYSXFsBeWiFW:LUG7sakS7cgyLCKZ50D8ZUSXFsBi

Runtime Data

Usage (stdout):

Creates, displays and deletes stored credentials.
Following commands are supported.Use VaultCmd /<command> /? for further help 
VaultCmd /list
VaultCmd /listschema
VaultCmd /listcreds
VaultCmd /addcreds
VaultCmd /deletecreds
VaultCmd /listproperties
VaultCmd /sync

Signature

  • Status: Signature verified.
  • Serial: 330000023241FB59996DCC4DFF000000000232
  • Thumbprint: FF82BC38E1DA5E596DF374C53E3617F7EDA36B06
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: VAULTCMD.EXE.MUI
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.18362.1 (WinBuild.160101.0800)
  • Product Version: 10.0.18362.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of VaultCmd.exe being misused. While VaultCmd.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma posh_ps_enumerate_password_windows_credential_manager.yml - vaultcmd DRL 1.0
atomic-red-team index.md - Atomic Test #4: Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials] [windows] MIT License. © 2018 Red Canary
atomic-red-team index.md - Atomic Test #5: Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials] [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md - Atomic Test #4: Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials] [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md - Atomic Test #5: Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials] [windows] MIT License. © 2018 Red Canary
atomic-red-team T1555.md - Atomic Test #4 - Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials] MIT License. © 2018 Red Canary
atomic-red-team T1555.md - Atomic Test #5 - Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials] MIT License. © 2018 Red Canary
atomic-red-team T1555.md ## Atomic Test #4 - Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials] MIT License. © 2018 Red Canary
atomic-red-team T1555.md This module will enumerate credentials stored in Windows Credentials vault of Windows Credential Manager using builtin utility vaultcmd.exe MIT License. © 2018 Red Canary
atomic-red-team T1555.md vaultcmd /listcreds:”Windows Credentials” /all MIT License. © 2018 Red Canary
atomic-red-team T1555.md ## Atomic Test #5 - Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials] MIT License. © 2018 Red Canary
atomic-red-team T1555.md This module will enumerate credentials stored in Web Credentials vault of Windows Credential Manager using builtin utility vaultcmd.exe MIT License. © 2018 Red Canary
atomic-red-team T1555.md vaultcmd /listcreds:”Web Credentials” /all MIT License. © 2018 Red Canary

MIT License. Copyright (c) 2020-2021 Strontic.