Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (2024)

On-Demand Webinar

For as long as security professionals have implemented advanced security controls, the bad (and good) guys always seem to find plenty of ways around them. To begin with they started using reflective memory attacks to load DLLs “by hand” thus bypassing system choke points where critical controls such as allowlisting could be enforced. That’s in addition to the usual buffer overflows and shellcodes.

But in this real training for free session I’m going to show you a very powerful method, found in the wild, to quietly download a large and functional malware (e.g. RAT, keylogger, ransomware) without depending on any unpatched vulnerability. The one big requirement is the ability to run the VBA macro in the Word document that kicks the whole thing off.

The challenge for bad guys attacking a well patched, hygienic environment with strict controls is to get a sizeable amount of code to dependably run. Let’s say you succeed in getting a VBA macro to run in a Word document you send to someone at the target organization. You can only do so much in VBA to begin with and only as long as the user keeps the document open. So, you want to quickly download a larger chuck of code and get it running in another process while it remains active. But in this security-conscious environment if you simply download evil.exe and run it, legacy application allowlisting (e.g. AppLocker) will block it because it’s not on the allowlist or signed by an authorized software vendor like Microsoft or Adobe (because we know Adobe’s code signing servers are secure, right?). Or if application allowlisting isn’t in use, a threat hunter is going to see this strange program hash showing up in the logs.

In this session I’ll show you how this evil Word document’s macro downloads an innocent looking PNG image from a legitimate website but which has some binary shell code hidden within encoded in base64. Then the macro uses a weird feature in certutil.exe (a built-in Windows program) to convert the base64 content to actual binary code and hide it in the user’s profile. The file is actually a C# project file which is then fed into MSBuild. But not to create an EXE or DLL which is what you normally use MSBuild for. That wouldn’t help us if we are attacking a well secured environment for which attack was developed. Instead it gets far more interesting. I’ll show you how a little-known feature in msbuild, called inline tasks, allows bad guys to run powerful C# code without ever loading a DLL or EXE.

You’ll also see many other techniques such as hiding malicious code inside a well-known process and how the attacker reduces their radar signature by running certutil and msbuild via a “proxy” process so that there’s no suspect process lineage as in “WTW? Why is MS Word running certutil and msbuild.”

Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (1)

To view this webinar, complete the form below.

WATCH ON-DEMAND WEBINAR

Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (2024)

FAQs

What is the anatomy of an attack? ›

An attack can be broken down into 7 stages: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives.

Is certutil.exe a virus? ›

certutil.exe is an official Microsoft process it is part if the Certificate Service and if that was flagged, then that was a false positive and should not have been removed from Windows. Have you checked if that file still exists in the C:\Windows folder?

What is the anatomy of an attack and explain the stages of web application attacks? ›

The anatomy of a cyberattack has six components: reconnaissance, initial access, attack deployment, attack expansion, getting paid, and cleanup. At each phase, companies and individual users can take positive steps to protect user devices and IT systems.

In which step of the anatomy of an attack is information typically copied out to the public internet? ›

The attack phase now moves into exfiltration, the actual removal or theft of information assets. During this phase: Valuable data is typically consolidated and compressed or zipped. Data is sent to a bad actor-controlled server or data source that is available on the Internet.

How does certutil work? ›

Certutil.exe is a command-line program installed as part of Certificate Services. You can use certutil.exe to display certification authority (CA) configuration information, configure Certificate Services, and back up and restore CA components. The program also verifies certificates, key pairs, and certificate chains.

What is suspicious Certutil usage? ›

How hackers use Certutil.exe ?
  • Used to decode binaries hidden inside certificate files as Base64 information.
  • Used to download files from a given URL.
  • Used to install browser root certificates as a precursor to perform Adversary-in-the-Middle between connections to banking websites.
Jul 1, 2022

What does Certutil decode do? ›

CertUtil.exe may be used to encode and decode a file, including PE and script code. Encoding will convert a file to base64 with -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- tags. Malicious usage will include decoding a encoded file that was downloaded. Once decoded, it will be loaded by a parallel process.

What is the definition of an attack? ›

: the act of attacking with physical force or unfriendly words : assault. the victim of a knife attack. a verbal attack. 2. : a belligerent or antagonistic action.

What is the concept of attack? ›

: to act violently against (someone or something) : to try to hurt, injure, or destroy (something or someone) [+ object] He attacked the guard with a knife. Troops attacked the fortress at dawn.

What is the military definition of attack? ›

In the military, an attack is an advance of troops or the use of armed force against an enemy.

What is the meaning of physical attack? ›

Physical assault is when an individual or a group attacks a person physically, with or without the use of a weapon, or threatens to hurt that person. It can include scratching, pushing, kicking, punching, throwing things, using weapons or physically restraining another person.

Top Articles
Top Tips for a Great Letter of Recommendation - Enago Academy
Is Warren Buffett an Ethical Investor? - Seven Pillars Institute
Black Gelato Strain Allbud
2024 Fantasy Baseball: Week 10 trade values chart and rest-of-season rankings for H2H and Rotisserie leagues
Crossed Eyes (Strabismus): Symptoms, Causes, and Diagnosis
Naturalization Ceremonies Can I Pick Up Citizenship Certificate Before Ceremony
Mawal Gameroom Download
Clafi Arab
Espn Expert Picks Week 2
Lantana Blocc Compton Crips
Little Rock Arkansas Craigslist
South Bend Tribune Online
Jasmine Put A Ring On It Age
Costco Gas Foster City
Craftology East Peoria Il
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Buy Swap Sell Dirt Late Model
Samantha Aufderheide
Quick Answer: When Is The Zellwood Corn Festival - BikeHike
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
8005607994
Makemv Splunk
6892697335
Papa Johns Mear Me
Miles City Montana Craigslist
Goodwill Of Central Iowa Outlet Des Moines Photos
Delta Township Bsa
Rgb Bird Flop
Kqelwaob
Www.1Tamilmv.con
Babydepot Registry
Cars And Trucks Facebook
Skip The Games Ventura
Craigslist Gigs Wichita Ks
Td Ameritrade Learning Center
Rs3 Bis Perks
Questions answered? Ducks say so in rivalry rout
Improving curriculum alignment and achieving learning goals by making the curriculum visible | Semantic Scholar
What Is A K 56 Pink Pill?
Cnp Tx Venmo
Levi Ackerman Tattoo Ideas
Natasha Tosini Bikini
Brother Bear Tattoo Ideas
Vagicaine Walgreens
Jane Powell, MGM musical star of 'Seven Brides for Seven Brothers,' 'Royal Wedding,' dead at 92
Unblocked Games 6X Snow Rider
Jackerman Mothers Warmth Part 3
Zits Comic Arcamax
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Where To Find Mega Ring In Pokemon Radical Red
Craigslist Centre Alabama
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5965

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.