heroui logo

CertUtil Download With VerifyCtl and Split Arguments

Splunk Security Content

View Source
Summary
This analytic rule detects the use of `certutil.exe` to download files with specific arguments `-VerifyCtl` and `-f`, which may indicate malicious activity. The detection is performed by monitoring command-line executions across Windows endpoints through telemetry retrieved from Endpoint Detection and Response (EDR) solutions. `certutil.exe` is a legitimate Windows utility often misused by attackers to download and execute harmful files, potentially leading to code execution or data compromise. The rule looks for command instances where `certutil.exe` is invoked with these parameters, allowing defenders to identify this suspicious behavior and respond accordingly to prevent exploitation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • User Account
ATT&CK Techniques
  • T1105
Created: 2024-12-10