Ingress Tool Transfer - Certutil

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This detection addresses most of the known ways to utilize this binary for malicious/unintended purposes. It attempts to accommodate for most detection evasion techniques, like commandline obfuscation and binary renaming.

Attribute Value
Type Analytic Rule
Solution FalconFriday
ID f0be11a9-ec48-4df6-801d-479556044d4e
Severity Low
Status Available
Kind Scheduled
Tactics CommandAndControl, DefenseEvasion
Techniques T1105, T1564.004, T1027, T1140
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceFileEvents ?
DeviceProcessEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to FalconFriday