cmdkey.exe
- File Path:
C:\WINDOWS\SysWOW64\cmdkey.exe
- Description: Credential Manager Command Line Utility
Hashes
Type | Hash |
---|---|
MD5 | E33DB7B7EC84FA314E917FABD05312D1 |
SHA1 | 7CC282DD87B8FEC197547C81A158B0A4B03DAF16 |
SHA256 | 224999A92BF4108AB32BB06DEB7510A534431D41B86BC527B1028C70A15705EE |
SHA384 | E4051F8C18479E146CDDADB8473D55B9066E520FE99A921FF85C70B4816ACBFED2B91800F90D69F31FE192D93F9196DE |
SHA512 | 9CD06D586FFB8328D30934FD83B3CBAEB55FDE83F0FE040F1B590A2085BDFF2B3233189D1BCBF83783B8DCB1EFE5984949F97B852753F89135F886986800D992 |
SSDEEP | 384:sXDMrVrS2sXpdwDqudqL/XYzd/3YGllWiwWW5K:sXDbPwDLkYhAGlPI5K |
Runtime Data
Usage (stdout):
Creates, displays, and deletes stored user names and passwords.
The syntax of this command is:
CMDKEY [{/add | /generic}:targetname {/smartcard | /user:username {/pass{:password} }} | /delete{:targetname | /ras} | /list{:targetname}]
Examples:
To list available credentials:
cmdkey /list
cmdkey /list:targetname
To create domain credentials:
cmdkey /add:targetname /user:username /pass:password
cmdkey /add:targetname /user:username /pass
cmdkey /add:targetname /user:username
cmdkey /add:targetname /smartcard
To create generic credentials:
The /add switch may be replaced by /generic to create generic credentials
To delete existing credentials:
cmdkey /delete:targetname
To delete RAS credentials:
cmdkey /delete /ras
Signature
- Status: Signature verified.
- Serial:
3300000266BD1580EFA75CD6D3000000000266
- Thumbprint:
A4341B9FD50FB9964283220A36A1EF6F6FAA7840
- Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
- Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
File Metadata
- Original Filename: cmdkey.exe
- Product Name: Microsoft Windows Operating System
- Company Name: Microsoft Corporation
- File Version: 10.0.18362.1 (WinBuild.160101.0800)
- Product Version: 10.0.18362.1
- Language: English (United States)
- Legal Copyright: Microsoft Corporation. All rights reserved.
Possible Misuse
The following table contains possible examples of cmdkey.exe
being misused. While cmdkey.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proc_creation_win_cmdkey_recon.yml | title: Cmdkey Cached Credentials Recon |
DRL 1.0 |
sigma | proc_creation_win_cmdkey_recon.yml | description: Detects usage of cmdkey to look for cached credentials |
DRL 1.0 |
sigma | proc_creation_win_cmdkey_recon.yml | - https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation |
DRL 1.0 |
sigma | proc_creation_win_cmdkey_recon.yml | Image\|endswith: '\cmdkey.exe' |
DRL 1.0 |
sigma | proc_creation_win_local_system_owner_account_discovery.yml | - Image\|endswith: '\cmdkey.exe' |
DRL 1.0 |
sigma | proc_creation_win_mstsc.yml | Image\|endswith: \cmdkey.exe |
DRL 1.0 |
LOLBAS | Cmdkey.yml | Name: Cmdkey.exe |
|
LOLBAS | Cmdkey.yml | - Command: cmdkey /list |
|
LOLBAS | Cmdkey.yml | - Path: C:\Windows\System32\cmdkey.exe |
|
LOLBAS | Cmdkey.yml | - Path: C:\Windows\SysWOW64\cmdkey.exe |
|
LOLBAS | Cmdkey.yml | - Link: https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation |
|
LOLBAS | Cmdkey.yml | - Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmdkey |
|
atomic-red-team | T1021.001.md | cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password | MIT License. © 2018 Red Canary |
atomic-red-team | T1087.001.md | cmdkey.exe /list | MIT License. © 2018 Red Canary |
Additional Info*
*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.
cmdkey
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
Creates, lists, and deletes stored user names and passwords or credentials.
Syntax
cmdkey [{/add:<targetname>|/generic:<targetname>}] {/smartcard | /user:<username> [/pass:<password>]} [/delete{:<targetname> | /ras}] /list:<targetname>
Parameters
Parameters | Description |
---|---|
/add:<targetname> |
Adds a user name and password to the list.<p>Requires the parameter of <targetname> which identifies the computer or domain name that this entry will be associated with. |
/generic:<targetname> |
Adds generic credentials to the list.<p>Requires the parameter of <targetname> which identifies the computer or domain name that this entry will be associated with. |
/smartcard | Retrieves the credential from a smart card. If more than one smart card is found on the system when this option is used, cmdkey displays information about all available smart cards, and then prompts the user to specify which one to use. |
/user:<username> |
Specifies the user or account name to store with this entry. If <username> isn’t supplied, it will be requested. |
/pass:<password> |
Specifies the password to store with this entry. If <password> isn’t supplied, it will be requested. Passwords are not displayed after they’re stored. |
/delete:{<targetname> \| /ras} |
Deletes a user name and password from the list. If <targetname> is specified, that entry is deleted. If /ras is specified, the stored remote access entry is deleted. |
/list:<targetname> |
Displays the list of stored user names and credentials. If <targetname> isn’t specified, all stored user names and credentials are listed. |
/? | Displays help at the command prompt. |
Examples
To display a list of all user names and credentials that are stored, type:
cmdkey /list
To add a user name and password for user Mikedan to access computer Server01 with the password Kleo, type:
cmdkey /add:server01 /user:mikedan /pass:Kleo
To add a user name and password for user Mikedan to access computer Server01 and prompt for the password whenever Server01 is accessed, type:
cmdkey /add:server01 /user:mikedan
To delete a credential stored by remote access, type:
cmdkey /delete /ras
To delete a credential stored for Server01, type:
cmdkey /delete:server01
Additional References
MIT License. Copyright (c) 2020-2021 Strontic.