Skip to content

This case study documents a stealthy credential-harvesting technique in which the attacker used a lightweight binary (browserdump.exe) to extract stored credentials from browser cache files—specifically Chrome and Edge—without elevating privileges or triggering persistence indicators.

License

Notifications You must be signed in to change notification settings

Compcode1/ioc6-credential-access

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

This case study documents a stealthy credential-harvesting technique in which the attacker used a lightweight binary (browserdump.exe) to extract stored credentials from browser cache files—specifically Chrome and Edge—without elevating privileges or triggering persistence indicators. The executable was launched from a writable public folder, avoided parent installer chains, and immediately interfaced with Login Data files stored in browser profile directories.

Key insights:

The IOC originated from an EDR alert detecting an unsigned binary in an unusual location performing credential-related file reads.

Triage followed the Host-Based Local Triage Protocol, leading to Layer 1 (Process Execution) and Layer 4 (Credential Management) system mapping.

Volatile memory inspection revealed in-memory artifacts from the decrypted credential cache, confirming successful extraction of sensitive data without modifying system persistence mechanisms.

No service creation, no registry keys, and no privilege escalation were observed—highlighting the low-noise, reconnaissance-driven nature of this tactic.

Attacker behavior aligned with credential validation operations—common in phishing follow-ups or APTs gauging target viability.

Defender actions included containment, memory capture, credential invalidation, and deployment of telemetry-based detection rules for access to browser cache directories.

This attack exemplifies how convenience features like saved logins become high-value targets and shows the importance of visibility into user-level behaviors. It also demonstrates the power of endpoint telemetry and memory inspection in confirming credential theft operations that bypass deeper system defenses.

About

This case study documents a stealthy credential-harvesting technique in which the attacker used a lightweight binary (browserdump.exe) to extract stored credentials from browser cache files—specifically Chrome and Edge—without elevating privileges or triggering persistence indicators.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published