ANAVEM
Languagefr
Windows security monitoring dashboard showing credential manager events and security logs
Event ID 5376InformationMicrosoft-Windows-Security-AuditingWindows

Windows Event ID 5376 – Microsoft-Windows-Security-Auditing: Credential Manager Credentials Were Backed Up

Event ID 5376 fires when Windows Credential Manager credentials are backed up to a file or external location, indicating potential security activity that requires monitoring.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 202612 min read 0
Event ID 5376Microsoft-Windows-Security-Auditing 5 methods 12 min
Event Reference

What This Event Means

Windows Event ID 5376 represents a critical security audit event that logs credential backup operations within the Windows Credential Manager subsystem. The Credential Manager stores user credentials for various applications, websites, and network resources, making it a valuable target for both legitimate administrators and malicious actors.

When this event fires, Windows has detected that stored credentials were exported from the local credential vault to an external location. This could include backing up web passwords, Windows credentials, certificate-based credentials, or generic credentials stored by applications. The backup process creates encrypted files that contain sensitive authentication data.

The event includes crucial forensic information such as the backup file path, the number of credentials backed up, the user account that initiated the operation, and timestamp details. Security professionals use this information to validate authorized backup procedures and identify potential credential theft attempts.

In enterprise environments, this event often correlates with scheduled backup routines or user-initiated exports before system migrations. However, unexpected occurrences of Event ID 5376, especially outside business hours or from unusual user accounts, may indicate compromise attempts or insider threats targeting credential stores.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • User manually backing up credentials through Control Panel → Credential Manager
  • PowerShell scripts executing Export-Credential or similar cmdlets
  • Third-party backup software accessing Windows Credential Manager
  • System migration tools exporting user credentials during computer transfers
  • Malware or attackers harvesting stored credentials for lateral movement
  • Administrative scripts performing bulk credential management operations
  • Browser password managers synchronizing with Windows Credential Manager
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of the credential backup event to understand what was backed up and by whom.

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsSecurity
  3. Filter for Event ID 5376 by right-clicking the Security log and selecting Filter Current Log
  4. Enter 5376 in the Event IDs field and click OK
  5. Double-click the event to view details including:
    • Subject account name and domain
    • Backup file path and location
    • Number of credentials backed up
    • Process name that initiated the backup

Use PowerShell for more detailed analysis:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=5376} -MaxEvents 50 | Format-Table TimeCreated, Id, LevelDisplayName, Message -Wrap
02

Correlate with User Activity and Process Information

Investigate the context around the credential backup by examining related events and process activity.

  1. Check for related logon events around the same time:
$BackupTime = (Get-WinEvent -FilterHashtable @{LogName='Security'; Id=5376} -MaxEvents 1).TimeCreated
$StartTime = $BackupTime.AddMinutes(-30)
$EndTime = $BackupTime.AddMinutes(30)

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4624,4625,4648; StartTime=$StartTime; EndTime=$EndTime} | Format-Table TimeCreated, Id, Message
  1. Examine process creation events to identify the application that initiated the backup:
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4688; StartTime=$StartTime; EndTime=$EndTime} | Where-Object {$_.Message -like "*credential*" -or $_.Message -like "*backup*"}
  1. Check if the backup file still exists at the specified location
  2. Verify the user account had legitimate reasons to perform credential backup
  3. Review any scheduled tasks or scripts that might have triggered the backup
03

Analyze Credential Manager State and Backup Files

Examine the current state of Credential Manager and investigate any backup files created during the event.

  1. List current credentials in Credential Manager using PowerShell:
# Requires elevated privileges
Get-StoredCredential | Format-Table UserName, Target, Type, LastWriteTime
  1. Check the backup file location mentioned in the event (if accessible):
$BackupPath = "C:\Path\From\Event\Details"
if (Test-Path $BackupPath) {
    Get-ChildItem $BackupPath -Recurse | Format-Table Name, Length, CreationTime, LastWriteTime
} else {
    Write-Host "Backup file not found at specified location" -ForegroundColor Yellow
}
  1. Review Credential Manager through Control Panel:
    • Open Control PanelUser AccountsCredential Manager
    • Check both Web Credentials and Windows Credentials sections
    • Note any recently modified or suspicious entries
  2. Examine registry entries for credential manager activity:
Get-ItemProperty -Path "HKCU\Software\Microsoft\Protected Storage System Provider" -ErrorAction SilentlyContinue
04

Implement Enhanced Monitoring and Alerting

Set up proactive monitoring to detect future credential backup events and establish baseline behavior patterns.

  1. Create a PowerShell script for continuous monitoring:
# Save as Monitor-CredentialBackup.ps1
$LogName = 'Security'
$EventID = 5376
$LastCheck = (Get-Date).AddHours(-1)

while ($true) {
    $Events = Get-WinEvent -FilterHashtable @{LogName=$LogName; Id=$EventID; StartTime=$LastCheck} -ErrorAction SilentlyContinue
    
    if ($Events) {
        foreach ($Event in $Events) {
            $Message = "ALERT: Credential backup detected at $($Event.TimeCreated) by $($Event.Properties[1].Value)"
            Write-Host $Message -ForegroundColor Red
            # Add email notification or SIEM integration here
        }
    }
    
    $LastCheck = Get-Date
    Start-Sleep -Seconds 300  # Check every 5 minutes
}
  1. Configure Windows Event Forwarding for centralized logging:
# On collector server
wecutil qc /q

# Create subscription for Event ID 5376
$SubscriptionXML = @"

    CredentialBackupMonitoring
    ]]>

"@

$SubscriptionXML | Out-File -FilePath "C:\temp\credential-backup-subscription.xml"
wecutil cs "C:\temp\credential-backup-subscription.xml"
  1. Set up Task Scheduler for automated response:
  2. Create custom Event Viewer views filtered for Event ID 5376
  3. Document baseline patterns of legitimate credential backup operations
05

Advanced Forensic Analysis and Threat Hunting

Perform deep forensic analysis to determine if the credential backup represents a security incident requiring incident response procedures.

  1. Collect comprehensive event data for analysis:
# Export all related security events for forensic analysis
$ExportPath = "C:\Forensics\CredentialBackup-$(Get-Date -Format 'yyyyMMdd-HHmmss').evtx"
$StartDate = (Get-Date).AddDays(-7)

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=5376,4624,4625,4648,4688; StartTime=$StartDate} | Export-Clixml -Path "$ExportPath.xml"

# Create timeline of events
Get-WinEvent -FilterHashtable @{LogName='Security'; Id=5376; StartTime=$StartDate} | 
    Select-Object TimeCreated, Id, LevelDisplayName, @{Name='User';Expression={$_.Properties[1].Value}}, @{Name='BackupPath';Expression={$_.Properties[5].Value}} | 
    Sort-Object TimeCreated | Format-Table -AutoSize
  1. Analyze network connections during the backup timeframe:
# Check for suspicious network activity
Get-NetTCPConnection | Where-Object {$_.State -eq 'Established'} | 
    Select-Object LocalAddress, LocalPort, RemoteAddress, RemotePort, OwningProcess | 
    ForEach-Object {
        $Process = Get-Process -Id $_.OwningProcess -ErrorAction SilentlyContinue
        $_ | Add-Member -NotePropertyName ProcessName -NotePropertyValue $Process.ProcessName
        $_
    } | Format-Table
  1. Check for indicators of compromise:
  2. Review file system activity around backup locations using Get-ChildItem with -Force parameter
  3. Examine memory dumps if available for credential harvesting tools
  4. Correlate with threat intelligence feeds for known credential theft techniques
  5. Document findings and create incident response timeline if malicious activity is confirmed
Warning: If you suspect credential theft, immediately change all potentially compromised passwords and review access logs for unauthorized activity.

Overview

Event ID 5376 from Microsoft-Windows-Security-Auditing fires when Windows Credential Manager credentials are backed up to a file or external storage location. This event appears in the Security log and indicates that stored credentials—including passwords, certificates, and authentication tokens—have been exported from the local credential store.

The event triggers during legitimate backup operations initiated by users through Control Panel or PowerShell cmdlets, but also fires during malicious credential harvesting attempts. Security teams monitor this event closely because credential backup operations can indicate both authorized system maintenance and unauthorized data exfiltration attempts.

This event provides detailed information about which credentials were backed up, the target location, and the user account that initiated the operation. The timing and frequency of these events help distinguish between routine administrative tasks and suspicious activity patterns that warrant investigation.

Frequently Asked Questions

What does Windows Event ID 5376 indicate and should I be concerned?+
Event ID 5376 indicates that Windows Credential Manager credentials were backed up to a file or external location. While this can be legitimate administrative activity, it requires investigation because credential backups are also used by attackers to steal stored passwords and authentication tokens. Check the user account, timing, and backup location to determine if the activity was authorized. Unexpected occurrences, especially from unusual accounts or outside business hours, warrant immediate security review.
How can I tell if Event ID 5376 represents malicious credential harvesting versus legitimate backup?+
Legitimate credential backups typically occur during business hours by authorized users, often correlating with system migrations or scheduled maintenance. Malicious activity shows patterns like: backups to unusual locations (temp folders, external drives), execution by service accounts or compromised users, correlation with other suspicious events (failed logins, privilege escalation), and backups of large numbers of credentials. Review the process name that initiated the backup, verify the user had legitimate reasons for the action, and check if the backup file was subsequently accessed or transferred.
Which Windows logs should I check alongside Event ID 5376 for complete investigation?+
Check the Security log for related authentication events (4624, 4625, 4648), process creation events (4688), and privilege escalation attempts (4672). Review the System log for service starts/stops and the Application log for credential manager errors. Also examine PowerShell logs (4103, 4104) if PowerShell was used for the backup, and Windows Defender logs for any malware detections. Correlating these events provides context about whether the credential backup was part of legitimate activity or a security incident.
Can I prevent unauthorized credential backups while allowing legitimate ones?+
Yes, implement several controls: Use Group Policy to restrict access to Credential Manager backup functions for non-administrative users. Enable advanced auditing to log all credential manager operations. Deploy application whitelisting to prevent unauthorized tools from accessing credential stores. Configure User Account Control (UAC) to require elevation for credential operations. Monitor and alert on Event ID 5376 occurrences. For high-security environments, consider using Windows Hello for Business or certificate-based authentication to reduce reliance on password-based credentials stored in Credential Manager.
What immediate steps should I take if I suspect malicious credential harvesting based on Event ID 5376?+
Immediately isolate the affected system from the network to prevent lateral movement. Change passwords for all accounts that may have had credentials stored on the compromised system. Review access logs for those accounts to identify any unauthorized activity. Collect forensic evidence including event logs, memory dumps, and file system artifacts. Check other systems for similar Event ID 5376 patterns indicating widespread compromise. Scan for known credential harvesting tools like Mimikatz or LaZagne. Implement additional monitoring on critical accounts and systems. Consider engaging incident response professionals if the scope appears significant.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...