heroui logo

Suspicious CertUtil Commands

Elastic Detection Rules

View Source
Summary
The detection rule identifies potentially malicious commands executed via `certutil.exe`, a native Windows tool commonly used for managing digital certificates. Attackers frequently exploit `certutil.exe` to carry out tasks such as downloading obfuscated malware, performing offensive security actions, or accessing external resources to exfiltrate data in a stealthy manner. The rule operates on logs from various Windows-based data sources, including Microsoft Defender, Sysmon, and Elastic Endgame, and focuses on process start events where `certutil.exe` is invoked with specific command-line arguments indicative of suspicious activity. A key component of the rule includes a comprehensive investigatory approach, providing guidance on examining parent process trees, command line arguments, and associated host behaviors to identify and mitigate potential threats effectively. The detection is categorized with a medium severity level and a risk score of 47, signaling its relevance in threat detection environments.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • File
ATT&CK Techniques
  • T1140
Created: 2020-02-18