heroui logo

Certificate Abuse - Windows

Anvilogic Forge

View Source
Summary
This detection rule targets potential abuses of Active Directory (AD) Certificate Services, where attackers leverage tools like Certipy or Certify.exe to exploit misconfigurations. Such tools can enable attackers to enumerate certificate services and discover vulnerabilities, potentially leading to privilege escalation or lateral movement within a network. The rule monitors specific Certificate Services events (4886 and 4887) and process creation events (event ID 4688) that may involve those tools. It specifically looks for activity that includes command patterns indicative of requests to the certificate services, effectively capturing instances where the tools might have altered names to evade detection. The logic runs in Splunk, where it consolidates relevant process and event detail into a structured format for further analysis, enabling the identification of suspicious activity related to certificate abuse.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1649
Created: 2024-02-09