heroui logo

Windows CertUtil Download With URL Argument

Splunk Security Content

View Source
Summary
This analytic rule detects malicious usage of the Windows command-line utility `certutil.exe` when it is employed to download files through URL arguments. The detection leverages command-line execution telemetry from Endpoint Detection and Response (EDR) systems, particularly looking for the use of the `-URL` argument along with any other associated processing context. This behavior is of particular concern because `certutil.exe` is typically a legitimate tool that attackers can exploit for malicious purposes, allowing them to download and potentially execute dangerous files on the system. In scenarios where this activity is confirmed to be malicious, it could facilitate a range of attacks including code execution, information theft, or complete system compromise.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1105
Created: 2025-01-07