
Summary
This analytic rule detects the use of `certutil.exe` to download files with specific arguments `-VerifyCtl` and `-f`, which may indicate malicious activity. The detection is performed by monitoring command-line executions across Windows endpoints through telemetry retrieved from Endpoint Detection and Response (EDR) solutions. `certutil.exe` is a legitimate Windows utility often misused by attackers to download and execute harmful files, potentially leading to code execution or data compromise. The rule looks for command instances where `certutil.exe` is invoked with these parameters, allowing defenders to identify this suspicious behavior and respond accordingly to prevent exploitation.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- User Account
ATT&CK Techniques
- T1105
Created: 2024-12-10