Rules Contributing to certutil.exe Certificate Extraction Alert

The following rules are used to identify certutil.exe certificate extraction activity. Any one or more of these will trigger the certutil.exe Certificate Extraction Alert. Details for each rule can be viewed by clicking the More Details link in the description.

Title

Description

certutil.exe Certificate Extraction

The following analytic identifies the use of certutil.exe with arguments indicating the manipulation or extraction of certificates. This activity is significant because extracting certificates can allow attackers to sign new authentication tokens, particularly in federated environments like Windows ADFS. If confirmed malicious, this could enable attackers to forge authentication tokens, potentially leading to unauthorized access and privilege escalation within the network.