heroui logo

Certutil File Download

Anvilogic Forge

View Source
Summary
The rule "Certutil File Download" aims to detect instances where the Windows utility Certutil is used to download files from the internet, an action often associated with various cyberattack scenarios such as privilege escalation or tool deployment by threat actors. Attackers may employ this technique in circumstances where they have a low privileged shell and require additional tools or exploits to escalate their privileges and take full control of the target machine. By monitoring for the execution of Certutil alongside a URL pattern, this rule provides visibility into potentially malicious activity. Key associations include several advanced persistent threat (APT) groups such as APT41, DarkSide, and others, indicating the relevance and seriousness of this detection rule. The logic leverages Windows Sysmon data to identify events where Certutil is utilized to transfer files, filtering relevant events and aggregating the data for further analysis.
Categories
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Command
ATT&CK Techniques
  • T1027
  • T1105
Created: 2024-02-09