Root Certificate Installed - PowerShell
Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
Sigma rule (View on GitHub)
1title: Root Certificate Installed - PowerShell
2id: 42821614-9264-4761-acfc-5772c3286f76
3status: test
4description: Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.004/T1553.004.md
7author: 'oscd.community, @redcanary, Zach Stanford @svch0st'
8date: 2020-10-10
9modified: 2022-12-02
10tags:
11 - attack.defense-evasion
12 - attack.t1553.004
13logsource:
14 product: windows
15 category: ps_script
16 definition: 'Requirements: Script Block Logging must be enabled'
17detection:
18 selection1:
19 ScriptBlockText|contains|all:
20 - 'Move-Item'
21 - 'Cert:\LocalMachine\Root'
22 selection2:
23 ScriptBlockText|contains|all:
24 - 'Import-Certificate'
25 - 'Cert:\LocalMachine\Root'
26 condition: 1 of selection*
27falsepositives:
28 - Help Desk or IT may need to manually add a corporate Root CA on occasion. Need to test if GPO push doesn't trigger FP
29level: medium
References
Related rules
- Cisco Crypto Commands
- Install Root Certificate
- New Root Certificate Installed Via CertMgr.EXE
- New Root Certificate Installed Via Certutil.EXE
- Root Certificate Installed From Susp Locations