
Summary
This rule is designed to detect suspicious process creation events associated with the use of the X509Enrollment component in Windows environments. The X509Enrollment class is often leveraged for creating and managing X.509 certificates, which can be exploited by threat actors to evade defenses or establish persistence on compromised systems. The focus of the detection is on command line arguments that reference 'X509Enrollment.CBinaryConverter' or the UUID '884e2002-217d-11da-b2a4-000e7bbb2b09', which can indicate malicious activity or misuse of the certificate enrollment framework. This detection utilizes Windows process creation logs, particularly looking for anomalies in command line executions that might suggest nefarious intentions, thus helping security teams to quickly respond to potential attacks that involve certificate misuse or related techniques.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2022-12-23