heroui logo

Suspicious File Downloaded From Direct IP Via Certutil.EXE

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activities involving the execution of 'certutil.exe', a legitimate Windows utility used for certificate management. Specifically, it focuses on scenarios where 'certutil.exe' is executed with the ability to download files from direct IP addresses. These types of operations are often exploited by malicious actors to bypass security measures and download payloads directly from IP addresses instead of using domain names, thereby reducing the chances of detection. The rule captures the command line parameters to ensure that the utility is not being misused for unauthorized file downloads, particularly with specific flags like 'urlcache' and 'verifyctl'. Furthermore, it filters out certain command lines to increase detection accuracy, ensuring that only suspicious activities are flagged. Overall, the rule is intended to enhance the detection of evasion tactics commonly used in cyberattacks, particularly in environments where Windows systems are prevalent.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-02-15