
Summary
This detection rule identifies suspicious use of the Windows utility CertUtil.EXE, specifically when it is called with the '-encode' flag to encode files into Base64 format. The context of this rule revolves around the execution of CertUtil.EXE when it processes files located in directories that are generally considered risky or suspicious (e.g., AppData, Desktop, Temp directories, and more). By monitoring process creation events that match the criteria specified in this rule, security analysts can detect potential evasion tactics used by attackers who may be attempting to conceal malicious payloads or actions. The rule captures command line invocations containing indications of encoding while filtering for the specific locations known for fraudulent activity. This proactive approach assists in mitigating threats based on behavior patterns commonly associated with malware operations.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-05-15