Input Capture: GUI Input Capture

Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: Bypass User Account Control).

Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.[1] This type of prompt can be used to collect credentials via various languages such as AppleScript[2][3] and PowerShell[2][4].

ID: T1056.002
Sub-technique of:  T1056
Tactics: Collection, Credential Access
Platforms: Windows, macOS
Permissions Required: User
Data Sources: PowerShell logs, Process command-line parameters, Process monitoring, User interface
Contributors: Matthew Molyett, @s1air, Cisco Talos
Version: 1.0
Created: 11 February 2020
Last Modified: 24 March 2020

Procedure Examples

Name Description

Bundlore prompts the user for their credentials.[5]


Calisto presents an input prompt asking for the user's login and password.[6]


Dok prompts the user for credentials.[7]


FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.[8][9]


iKitten prompts the user for their credentials.[7]


Keydnap prompts the users for credentials.[10]


Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.[11]


Proton prompts users for their credentials.[7]


Mitigation Description
User Training

Use user training as a way to bring awareness and raise suspicion for potentially malicious events and dialog boxes (ex: Office documents prompting for credentials).


Monitor process execution for unusual programs as well as malicious instances of Command and Scripting Interpreter that could be used to prompt users for credentials.

Inspect and scrutinize input prompts for indicators of illegitimacy, such as non-traditional banners, text, timing, and/or sources.