- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects access to wceaux.dll
, a component of the Windows Credential Editor (WCE) tool used to extract plaintext passwords and hashes from memory.
This rule monitors for file access operations targeting the wceaux.dll
file. WCE is a well-known credential theft tool that extracts plaintext passwords, NTLM hashes, and Kerberos tickets directly from Windows memory.
The query looks for Windows event IDs 4656
, 4658
, 4660
, or 4663
which represent various file access operations. These events are triggered when files are opened, closed, or accessed. The @Event.EventData.Data.ObjectName
field is examined for paths containing wceaux.dll
, which is a core component of the WCE tool.
The wceaux.dll
file is exclusively associated with the WCE tool and has no legitimate use in standard enterprise environments. Its presence on a system strongly indicates an attempt to steal credentials. When WCE is executed, it injects wceaux.dll
into the Local Security Authority Subsystem Service (LSASS) process to extract credential material from memory.
wceaux.dll
on {{host}}
and the user account that accessed it.wceaux.dll
and its parent process.wceaux.dll
has administrative privileges.