diff --git a/atomics/T1140/T1140.md b/atomics/T1140/T1140.md
index ab95b4f9..f3df3046 100644
--- a/atomics/T1140/T1140.md
+++ b/atomics/T1140/T1140.md
@@ -26,6 +26,8 @@ Contributors: Matthew Demaske, Adaptforward, Red Canary
- [Atomic Test #1 - Deobfuscate/Decode Files Or Information](#atomic-test-1---deobfuscatedecode-files-or-information)
+- [Atomic Test #2 - Certutil Rename and Decode](#atomic-test-2---certutil-rename-and-decode)
+
@@ -46,3 +48,22 @@ certutil.exe -encode #{executable} file.txt
certutil.exe -decode file.txt #{executable}
```
+
+
+## Atomic Test #2 - Certutil Rename and Decode
+Rename certutil and decode a file. This is in reference to latest research by FireEye [here](https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html)
+
+**Supported Platforms:** Windows
+
+
+#### Inputs
+| Name | Description | Type | Default Value |
+|------|-------------|------|---------------|
+| executable | name of executable/file to decode | path | c:\file.exe|
+
+#### Run it with `command_prompt`!
+```
+cmd.exe /c copy %windir%\\system32\\certutil.exe %temp%tcm.tmp
+cmd.exe /c %temp%tcm.tmp -decode #{executable}
+```
+
diff --git a/atomics/T1140/T1140.yaml b/atomics/T1140/T1140.yaml
index d2547722..bcc7e463 100644
--- a/atomics/T1140/T1140.yaml
+++ b/atomics/T1140/T1140.yaml
@@ -21,3 +21,22 @@ atomic_tests:
command: |
certutil.exe -encode #{executable} file.txt
certutil.exe -decode file.txt #{executable}
+
+- name: Certutil Rename and Decode
+ description: |
+ Rename certutil and decode a file. This is in reference to latest research by FireEye [here](https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html)
+
+ supported_platforms:
+ - windows
+
+ input_arguments:
+ executable:
+ description: name of executable/file to decode
+ type: path
+ default: c:\file.exe
+
+ executor:
+ name: command_prompt
+ command: |
+ cmd.exe /c copy %windir%\\system32\\certutil.exe %temp%tcm.tmp
+ cmd.exe /c %temp%tcm.tmp -decode #{executable}
diff --git a/atomics/index.md b/atomics/index.md
index fb1afe2e..c423c08e 100644
--- a/atomics/index.md
+++ b/atomics/index.md
@@ -149,6 +149,7 @@
- T1073 DLL Side-Loading [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
- [T1140 Deobfuscate/Decode Files or Information](./T1140/T1140.md)
- Atomic Test #1: Deobfuscate/Decode Files Or Information [windows]
+ - Atomic Test #2: Certutil Rename and Decode [windows]
- [T1089 Disabling Security Tools](./T1089/T1089.md)
- Atomic Test #1: Disable iptables firewall [linux]
- Atomic Test #2: Disable syslog [linux]
diff --git a/atomics/windows-index.md b/atomics/windows-index.md
index 460857b5..e16c7ac8 100644
--- a/atomics/windows-index.md
+++ b/atomics/windows-index.md
@@ -21,6 +21,7 @@
- T1073 DLL Side-Loading [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
- [T1140 Deobfuscate/Decode Files or Information](./T1140/T1140.md)
- Atomic Test #1: Deobfuscate/Decode Files Or Information [windows]
+ - Atomic Test #2: Certutil Rename and Decode [windows]
- [T1089 Disabling Security Tools](./T1089/T1089.md)
- T1211 Exploitation for Defense Evasion [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)
- T1181 Extra Window Memory Injection [CONTRIBUTE A TEST](https://atomicredteam.io/contributing)