Detecting malicious file obfuscation using certutil.exe
CertUtil.exe can be used by attackers to encode a portable executable to a certificate file, which is base64 encoded, to hide the originating file. There are many utilities cross-platform to encode using XOR, using compressed .cab files to hide contents and scripting languages that may perform similar native Windows tasks.
This search will allow you to detect when CertUtil.exe is used to encode and decode files.
Required data
How to use Splunk software for this use case
- Next steps
In addition, these Splunk resources might help you understand and implement this use case:
- Blog: Threat Hunting with Splunk: Hands-on Tutorials for the Active Hunter
- If you are a Splunk Enterprise Security customer, you can also get help from the Security Research team's support options on GitHub.