
Summary
The detection rule identifies potentially malicious commands executed via `certutil.exe`, a native Windows tool commonly used for managing digital certificates. Attackers frequently exploit `certutil.exe` to carry out tasks such as downloading obfuscated malware, performing offensive security actions, or accessing external resources to exfiltrate data in a stealthy manner. The rule operates on logs from various Windows-based data sources, including Microsoft Defender, Sysmon, and Elastic Endgame, and focuses on process start events where `certutil.exe` is invoked with specific command-line arguments indicative of suspicious activity. A key component of the rule includes a comprehensive investigatory approach, providing guidance on examining parent process trees, command line arguments, and associated host behaviors to identify and mitigate potential threats effectively. The detection is categorized with a medium severity level and a risk score of 47, signaling its relevance in threat detection environments.
Categories
- Endpoint
- Windows
- Cloud
Data Sources
- Process
- Windows Registry
- Application Log
- Network Traffic
- File
ATT&CK Techniques
- T1140
Created: 2020-02-18