HackTool - Certify Execution
Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.
Sigma rule (View on GitHub)
1title: HackTool - Certify Execution
2id: 762f2482-ff21-4970-8939-0aa317a886bb
3status: test
4description: Detects Certify a tool for Active Directory certificate abuse based on PE metadata characteristics and common command line arguments.
5references:
6 - https://github.com/GhostPack/Certify
7author: pH-T (Nextron Systems)
8date: 2023-04-17
9modified: 2023-04-25
10tags:
11 - attack.discovery
12 - attack.credential-access
13 - attack.t1649
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 - Image|endswith: '\Certify.exe'
20 - OriginalFileName: 'Certify.exe'
21 - Description|contains: 'Certify'
22 selection_cli_commands:
23 CommandLine|contains:
24 - '.exe cas '
25 - '.exe find '
26 - '.exe pkiobjects '
27 - '.exe request '
28 - '.exe download '
29 selection_cli_options:
30 CommandLine|contains:
31 - ' /vulnerable'
32 - ' /template:'
33 - ' /altname:'
34 - ' /domain:'
35 - ' /path:'
36 - ' /ca:'
37 condition: selection_img or all of selection_cli_*
38falsepositives:
39 - Unknown
40level: high
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- Certificate Exported From Local Certificate Store
- Certificate Private Key Acquired
- Cisco Collect Data