
Summary
The detection rule for Certipy file modifications identifies suspicious activities related to the Certipy tool, which can be used to enumerate the Active Directory Certificate Services (AD CS) environment. By monitoring for the creation of specific files commonly associated with Certipy, this rule captures potential reconnaissance and data exfiltration attempts by malicious actors. Key files include those with extensions like .zip, .txt, .json, and .ccache, which signal information gathering activities that can pose threats such as unauthorized access to AD CS information, privilege escalation, or further attacks on the network. The detection leverages data from endpoint processes and file system changes, specifically utilizing Sysmon events to note relevant activities. As such, organizations are encouraged to maintain robust logging mechanisms on their endpoints to facilitate monitoring and quick response to detected threats.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
ATT&CK Techniques
- T1649
- T1560
Created: 2024-11-13