
Summary
The detection rule titled "CertUtil With Decode Argument" identifies the execution of CertUtil.exe with the 'decode' argument, which could indicate potential malicious activity. CertUtil is a command-line utility in Windows used for managing certificates, and its 'decode' option allows for the decoding of files that may have been encoded to obfuscate malicious content. The implementation of this rule is facilitated by data collected from various endpoint detection sources, particularly focused on command-line execution logs. Attackers often exploit CertUtil to decode files that have been downloaded from the internet, which may lead to unauthorized code execution, further system compromises, and possible data exfiltration. This detection rule emphasizes monitoring activities that leverage CertUtil and sets parameters around known processes that invoke the utility with decoding commands.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Command
ATT&CK Techniques
- T1140
Created: 2024-11-13