[Rule Tuning] Suspicious CertUtil Commands (#1564)
(cherry picked from commit ab521f7c4f)
This commit is contained in:
committed by
github-actions[bot]
parent
791c8f9864
commit
cb85a35e7a
@@ -1,10 +1,10 @@
|
||||
[metadata]
|
||||
creation_date = "2020/02/18"
|
||||
maturity = "production"
|
||||
updated_date = "2021/05/06"
|
||||
updated_date = "2021/10/15"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
author = ["Elastic", "Austin Songer"]
|
||||
description = """
|
||||
Identifies suspicious commands being used with certutil.exe. CertUtil is a native Windows component which is part of
|
||||
Certificate Services. CertUtil is often abused by attackers to live off the land for stealthier command and control or
|
||||
@@ -31,7 +31,7 @@ type = "eql"
|
||||
query = '''
|
||||
process where event.type == "start" and
|
||||
(process.name : "certutil.exe" or process.pe.original_file_name == "CertUtil.exe") and
|
||||
process.args : ("?decode", "?encode", "?urlcache", "?verifyctl", "?encodehex", "?decodehex")
|
||||
process.args : ("?decode", "?encode", "?urlcache", "?verifyctl", "?encodehex", "?decodehex", "?exportPFX")
|
||||
'''
|
||||
|
||||
|
||||
@@ -47,3 +47,4 @@ name = "Deobfuscate/Decode Files or Information"
|
||||
id = "TA0005"
|
||||
reference = "https://attack.mitre.org/tactics/TA0005/"
|
||||
name = "Defense Evasion"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user