Félix Brezo · @febrezo
156 followers · 213 posts · Server mastodon.social

From a perspective, the would be:

- .003: Command and Scripting Interpreter: Unix Shell. SHC payloads to be run still need a shell to be identified in the system and that the code inside the payload is, in fact, a shell script.
- .002: Obfuscated Files or Information: Software Packed with .
- : Debugger Evasion by using SHC with '-r'.
- : Ingress Tool Transfer by downloading payloads from Github.
- : Resource Hijacking with .

#threatintelligence #ttps #t1059 #t1027 #shc #t1622 #t1105 #t1496 #xmrig

Last updated 2 years ago

Wes Lambert · @weslambert
173 followers · 11 posts · Server infosec.exchange

🦖Day 57 of the
@velocidex
series

Artifact: Windows[.]Forensics[.]CertUtil

Link: docs.velociraptor.app/artifact

CertUtil is a built-in tool used to manage certificates on Windows systems.

It can be used to for living off of the land through (base64) decoding/encoding data, calculating file hashes, and downloading files from the internet.

attack.mitre.org/techniques/T1
attack.mitre.org/techniques/T1

This can be useful for an attacker trying to hide their intentions and/or faciliate tool transfer for lateral movement and persistence. Last, certutil can also be used for installing browser root certificates to allow for AiTM/MiTM attacks.


In the past, certutil has been used maliciously by the following groups:

- APT28
- APT41
- Rancor
- Turla
- and others


attack.mitre.org/software/S016

Certutil maintains a cache of downloaded files. This cache can contain valuable metadata.

This artifact parses the metadata within the certutil cache to establish what was downloaded, and when it was downloaded.

In this instance (shown in the image), a file called 'evil.ps1' was downloaded. 👀

The following command was run to generate this output:

'certutil -urlcache -split -f raw.githubusercontent.com/Exam legit.ps1'

You can use the following ART test (maybe with other options, such as 'verifyctl') if you would like to test this artifact yourself:

github.com/redcanaryco/atomic-

As mentioned previously, certutil can be also used for other operations such as decoding/encoding data.

You can also try the following ART test to experiment with this functionality:

github.com/redcanaryco/atomic-

That's it for now! Stay tuned to learn about more artifacts! 🦖

Also, check out the link below for a blog that analyzes the various artifacts left from certutil usage!

u0041.co/blog/post/3

#velociraptor #artifactsofautumn #t1105 #t1140 #s0160

Last updated 2 years ago