Wireless Credential Dumping using Netsh Command
editWireless Credential Dumping using Netsh Command
editIdentifies attempts to dump Wireless saved access keys in clear text using the Windows built-in utility Netsh.
Rule type: eql
Rule indices:
- endgame-*
- logs-crowdstrike.fdr*
- logs-endpoint.events.process-*
- logs-m365_defender.event-*
- logs-sentinel_one_cloud_funnel.*
- logs-system.security*
- logs-windows.forwarded*
- logs-windows.sysmon_operational-*
- winlogbeat-*
Severity: high
Risk score: 73
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Endpoint
- OS: Windows
- Use Case: Threat Detection
- Tactic: Credential Access
- Tactic: Discovery
- Data Source: Elastic Endgame
- Resources: Investigation Guide
- Data Source: Elastic Defend
- Data Source: Windows Security Event Logs
- Data Source: Microsoft Defender XDR
- Data Source: Sysmon
- Data Source: SentinelOne
- Data Source: Crowdstrike
Version: 217
Rule authors:
- Elastic
Rule license: Elastic License v2
Investigation guide
editTriage and analysis
Investigating Wireless Credential Dumping using Netsh Command
Possible investigation steps
- What did the alert-local netsh command expose or export?
-
Focus:
process.command_line,process.executable,process.pe.original_file_name,process.code_signature.subject_name. -
Implication: escalate when
key=clearappears with bulk profile listing,export profile, omitted profile name, remote-r, script-file-f, or redirection; lower concern only when one local profile display fits recognized support or recovery. A signed Microsoft binary does not clear credential exposure. - Does the launcher, session, and user context explain why this account retrieved a wireless key on this host?
-
Focus:
process.parent.executable,process.parent.command_line,process.Ext.session_info.logon_type,user.id,host.id. - Implication: escalate when the parent is a shell, script host, remote-admin chain, document-spawned process, unexpected service identity, or unusual device-support user; lower concern when an interactive support shell or endpoint-management parent on the same host explains the exact command.
- Did the same launcher fan out from one display command into broader wireless-profile collection?
-
Why: attackers often enumerate profile names with
wlan show profiles, then display or export cleartext secrets; same-launcher enumeration withoutkey=clearis precursor discovery. -
Focus: related process starts on
host.idandprocess.parent.entity_id, usingprocess.executableandprocess.command_line. !{investigate{"description":"","label":"Process starts from the same parent","providers":[[{"excluded":false,"field":"event.category","queryType":"phrase","value":"process","valueType":"string"},{"excluded":false,"field":"host.id","queryType":"phrase","value":"{{host.id}}","valueType":"string"},{"excluded":false,"field":"process.parent.entity_id","queryType":"phrase","value":"{{process.parent.entity_id}}","valueType":"string"}]],"relativeFrom":"now-1h","relativeTo":"now"}} -
Implication: escalate when the parent also runs profile enumeration, repeated
show profile,export profile, or export withoutname=; keep review local when activity stays isolated to one profile display. -
Hint: If
process.parent.entity_idis absent, pivot withhost.id,process.parent.pid, and the alert window. - Did the launcher or siblings stage recovered wireless material?
-
Focus: same-parent process starts on
host.id, usingprocess.executableandprocess.command_line; file events fromhost.idplusprocess.entity_idor weakerprocess.pid, reviewingfile.path,file.extension, andfile.size. !{investigate{"description":"","label":"File activity for the alerting process","providers":[[{"excluded":false,"field":"event.category","queryType":"phrase","value":"file","valueType":"string"},{"excluded":false,"field":"host.id","queryType":"phrase","value":"{{host.id}}","valueType":"string"},{"excluded":false,"field":"process.entity_id","queryType":"phrase","value":"{{process.entity_id}}","valueType":"string"}]],"relativeFrom":"now-1h","relativeTo":"now"}} - Implication: escalate when XML, redirected text, ZIP files, copied profiles, archive tools, copy utilities, cloud-sync clients, shell redirection, or script wrappers stage material for later use or transfer; missing file telemetry is unresolved, not benign. A clean file view lowers concern only when command and lineage also stay limited.
- If local evidence remains suspicious or unresolved, do related alerts change scope or urgency?
-
Focus: related alerts for
user.id, especially credential-access, lateral-movement, staging, remote-access, or persistence findings. !{investigate{"description":"","label":"Alerts associated with the user","providers":[[{"excluded":false,"field":"event.kind","queryType":"phrase","value":"signal","valueType":"string"},{"excluded":false,"field":"user.id","queryType":"phrase","value":"{{user.id}}","valueType":"string"}]],"relativeFrom":"now-48h/h","relativeTo":"now"}} - Implication: broaden response when the same user or host also shows dumping, staging, remote access, or persistence; keep scope local when related alerts are absent and local evidence supports one bounded workflow.
-
Hint: If the user view is sparse or the host is shared, review alerts for the same
host.id. !{investigate{"description":"","label":"Alerts associated with the host","providers":[[{"excluded":false,"field":"event.kind","queryType":"phrase","value":"signal","valueType":"string"},{"excluded":false,"field":"host.id","queryType":"phrase","value":"{{host.id}}","valueType":"string"}]],"relativeFrom":"now-48h/h","relativeTo":"now"}} - Escalate when command intent, lineage, same-launcher collection, staging, file artifacts, or related alerts show bulk credential access or broader compromise; close only when binary identity, command scope, parent workflow, user-host context, and recovery records bind to one recognized support or recovery action; preserve artifacts and escalate when evidence is mixed or incomplete.
False positive analysis
-
Helpdesk, field-support, device-recovery, imaging, hardware replacement, or Wi-Fi profile migration can retrieve one saved wireless key. Confirm signed netsh identity, one local profile display or expected export in
process.command_line, support-tooling parentage, and no bulk enumeration, archive staging, or transfer; use asset or ticket records only to corroborate that exact action, otherwise require the same executable, parent, command pattern,user.id,host.id, and quiet surrounding activity across prior alerts from this rule. -
Before creating an exception, validate recurrence of the same
process.executable,process.parent.executable,process.command_linepattern,user.id, andhost.idwith the same limited scope. Avoid exceptions onprocess.name,key=clearalone, the host alone, or all netsh wireless activity.
Response and remediation
-
If confirmed benign, reverse any temporary containment and document which evidence matched the support or recovery workflow: command scope, binary identity, parent workflow,
user.id,host.id, and absence of collection or staging. Create an exception only after the same limited pattern recurs. -
If suspicious but unconfirmed, preserve the alert record, case export, volatile process context,
process.entity_id,process.command_line,process.parent.command_line, sibling process starts, staged artifacts when recovered, and affecteduser.idandhost.id. Start with reversible containment such as temporary wireless or network restrictions; use host isolation only if staging, export, transfer, or broader compromise is evident. -
If confirmed malicious, isolate the endpoint or terminate the offending process through endpoint-response tooling after recording
process.entity_id,process.command_line, parent context, exposed profile names, staged artifacts, and related-alert evidence. If tooling is unavailable, escalate with the preserved evidence set. - Reset or rotate credentials exposed by the dumped wireless profile. For PSK environments, rotate the affected SSID key; for 802.1X environments, revoke or reissue affected certificates, reset cached credentials, and verify whether the exposed profile could grant broader network access.
-
Before deleting artifacts, review other hosts and users for the same
process.command_line, parent pattern, or exported profile artifacts so scoping finishes before evidence is destroyed. - Eradicate only scripts, batch files, XML exports, archives, and persistence mechanisms found during the investigation, then remediate the initial access path that allowed the key retrieval.
Setup
editSetup
This rule is designed for data generated by Elastic Defend, which provides native endpoint detection and response, along with event enrichments designed to work with our detection rules.
Setup instructions: https://ela.st/install-elastic-defend
Additional data sources
This rule also supports the following third-party data sources. For setup instructions, refer to the links below:
Rule query
editprocess where host.os.type == "windows" and event.type == "start" and (process.name : "netsh.exe" or ?process.pe.original_file_name == "netsh.exe") and process.args : "wlan" and process.args : "key*clear"
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Credential Access
- ID: TA0006
- Reference URL: https://attack.mitre.org/tactics/TA0006/
-
Technique:
- Name: OS Credential Dumping
- ID: T1003
- Reference URL: https://attack.mitre.org/techniques/T1003/
-
Technique:
- Name: Unsecured Credentials
- ID: T1552
- Reference URL: https://attack.mitre.org/techniques/T1552/
-
Sub-technique:
- Name: Credentials In Files
- ID: T1552.001
- Reference URL: https://attack.mitre.org/techniques/T1552/001/
-
Technique:
- Name: Credentials from Password Stores
- ID: T1555
- Reference URL: https://attack.mitre.org/techniques/T1555/
-
Tactic:
- Name: Discovery
- ID: TA0007
- Reference URL: https://attack.mitre.org/tactics/TA0007/
-
Technique:
- Name: System Network Configuration Discovery
- ID: T1016
- Reference URL: https://attack.mitre.org/techniques/T1016/
-
Technique:
- Name: System Information Discovery
- ID: T1082
- Reference URL: https://attack.mitre.org/techniques/T1082/