
Summary
The detection rule aims to identify instances where the Windows utility certutil.exe initiates a network connection. Certutil.exe is a built-in command-line tool used primarily for working with certificates, but it can be misused by attackers to download malware or additional unwanted payloads from the internet. This rule specifically monitors for established connections to uncommon destination ports typically associated with command-and-control (C2) infrastructures, such as ports 80 (HTTP), 135 (RPC), 443 (HTTPS), and 445 (SMB). If a process running certutil.exe is detected making a connection on these ports, it raises an alert, indicating it could be part of a malicious activity.
Categories
- Endpoint
- Windows
Data Sources
- Network Traffic
Created: 2022-09-02