heroui logo

Certutil Execution

Anvilogic Forge

View Source
Summary
The 'Certutil Execution' detection rule targets the execution of the 'certutil' command-line utility, which is often misused by threat actors as part of their attack tactics. Certutil is typically used for obtaining certificate authority information and configuring Certificate Services. However, adversaries, including groups like DarkSide, BlackMatter, and REvil, leverage this tool for malicious purposes such as encoding data for command-and-control (C2) communication, transferring files, and evading detection through obfuscation. This rule is tailored for environments where Sysmon logs are available, utilizing a Splunk logic format focusing on detecting executions of 'certutil.exe'. It aggregates relevant event data, including timestamps, host names, user information, and process details, filtering specifically for the term 'certutil' or 'certutil.exe'. Through the gathered intelligence, security teams can identify potential misuse of this utility in their networks and take proactive measures against associated threats.
Categories
  • Windows
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1132
  • T1105
  • T1140
  • T1027
Created: 2024-02-09