heroui logo

CertUtil Download With URLCache and Split Arguments

Splunk Security Content

View Source
Summary
This analytic rule aims to detect the usage of certutil.exe for downloading files by employing the arguments `-urlcache` and `-f`. Certutil.exe is commonly associated with certificate management tasks within Windows, and its employment for downloading files is unusual and raises suspicion of potential malicious activity, such as the download of malware or other unauthorized content. By leveraging telemetry from Endpoint Detection and Response (EDR) systems, specifically focusing on command-line executions of certutil.exe that match the specified criteria, security teams can identify potentially harmful behavior effectively. The rule utilizes a combination of event logs including Sysmon EventID 1 and Windows Event Log Security 4688 to track these executions, thereby enhancing incident detection and response capabilities.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1105
Created: 2024-12-10