Root Certificate Installed From Susp Locations
Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
Sigma rule (View on GitHub)
1title: Root Certificate Installed From Susp Locations
2id: 5f6a601c-2ecb-498b-9c33-660362323afa
3status: test
4description: Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
5references:
6 - https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/
7 - https://learn.microsoft.com/en-us/powershell/module/pki/import-certificate?view=windowsserver2022-ps
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2022-09-09
10modified: 2023-01-16
11tags:
12 - attack.defense-evasion
13 - attack.t1553.004
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 CommandLine|contains|all:
20 - 'Import-Certificate'
21 - ' -FilePath '
22 - 'Cert:\LocalMachine\Root'
23 CommandLine|contains:
24 - '\AppData\Local\Temp\'
25 - ':\Windows\TEMP\'
26 - '\Desktop\'
27 - '\Downloads\'
28 - '\Perflogs\'
29 - ':\Users\Public\'
30 condition: selection
31falsepositives:
32 - Unlikely
33level: high
References
Related rules
- Cisco Crypto Commands
- Install Root Certificate
- New Root Certificate Installed Via CertMgr.EXE
- New Root Certificate Installed Via Certutil.EXE
- Root Certificate Installed - PowerShell