heroui logo

Suspicious Download Via Certutil.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of certutil.exe, a Windows utility that can be misused for malicious activities, specifically its usage to download files. The rule focuses on certain command-line flags used with certutil that enable the downloading of files from the internet. It checks for command-line inputs containing 'urlcache' and 'verifyctl' and verifies whether the command line includes an HTTP request. This combination indicates potential malicious activity, particularly during attacks that leverage certutil for file retrieval. The presence of certutil in conjunction with these flags could signify an attempt to bypass security measures by exploiting legitimate system utilities, thus requiring closer scrutiny of the process creation logs to ensure that potentially harmful activity is mitigated.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-02-15