Date: 01/08/2025
Severity: High
Summary
Detects the execution of certutil with the "encode" flag to convert a file to Base64, targeting files located in potentially suspicious directories.
Indicators of Compromise (IOC) List
Image : | '\certutil.exe' |
OriginalFileName : | 'CertUtil.exe' |
CommandLine : | '-encode' - '\AppData\Roaming\' - '\Desktop\' - '\Local\Temp\' - '\PerfLogs\' - '\Users\Public\' - '\Windows\Temp\' - '$Recycle.Bin' |
Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection
Detection Query : | (resourcename = "Windows Security" AND eventtype = "4688") AND processname like "certutil.exe" AND commandline like "-encode" and (commandline like "\AppData\Roaming" or commandline like "\Desktop" or commandline like "\Local\Temp" or commandline like "\PerfLogs" or commandline like "\Users\Public" or commandline like "\Windows\Temp" or commandline like "$Recycle.Bin") |
Detection Query : | (technologygroup = "EDR") AND processname like "certutil.exe" AND commandline like "-encode" and (commandline like "\AppData\Roaming" or commandline like "\Desktop" or commandline like "\Local\Temp" or commandline like "\PerfLogs" or commandline like "\Users\Public" or commandline like "\Windows\Temp" or commandline like "$Recycle.Bin") |
Reference:
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_location.yml