heroui logo

Windows File Download Via CertUtil

Splunk Security Content

View Source
Summary
The detection rule targets the misuse of `certutil.exe` within Windows environments, particularly when employed to download files through the command-line using specific parameters (`-URL`, `-urlcache`, or `-verifyctl`). This behavior is closely monitored by analyzing command-line executions captured through Endpoint Detection and Response (EDR) telemetry. Attackers frequently leverage `certutil.exe`, a legitimate Windows utility, to download malicious payloads, which can culminate in severe compromises including arbitrary code execution and data loss. The rule amalgamates data from sources like Sysmon EventID 1 and Windows Event Logs (Security 4688), tracking instances of `certutil.exe` invoking potentially harmful arguments. By correlating these findings with user activity and process hierarchies, the rule seeks to effectively identify and respond to potential threats in real-time.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Process
  • Application Log
ATT&CK Techniques
  • T1105
Created: 2025-04-24