Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.19 KB

MATCH-S00359.md

File metadata and controls

35 lines (28 loc) · 1.19 KB

Rules: Suspicious Certutil Command

Description

Detects a suspicious Microsoft certutil execution with sub commands like 'decode' sub command, which is sometimes used to decode malicious code with the built-in certutil utility.

Additional Details

Detail Value
Type Templated Match
Category Defense Evasion
Apply Risk to Entities device_hostname, device_ip, user_username
Signal Name Suspicious Certutil Command
Summary Expression Suspicious Certutil command observed on host: {{device_hostname}}
Score/Severity Static: 3
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1140

Vendors and Products

Fields Used

Origin Field
Normalized Schema baseImage
Normalized Schema commandLine
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema user_username