heroui logo

Windows SQL Spawning CertUtil

Splunk Security Content

View Source
Summary
The 'Windows SQL Spawning CertUtil' detection rule identifies instances where the Windows SQL processes are used to spawn the CertUtil command for potentially malicious purposes. The analytic specifically tracks command-line executions that include parameters like '*urlcache*' and '*split*', which are indicative of CertUtil being used to download software maliciously. The intent behind this detection is to uncover actions typically associated with threat actors, such as Flax Typhoon, who exploit legitimate tools to maintain persistence within compromised networks, possibly leading to further attacks including data theft and ransomware deployment. The effectiveness of this rule lies in leveraging EDR data sources, notably Sysmon and Windows Event Logs, to correlate uncharacteristic behavior linked to SQL processes and CertUtil usage.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1105
Created: 2024-12-16