CertUtil.exe Could Allow Attackers To Download Malware While Bypassing AV

Discussion in 'malware problems & news' started by guest, Apr 4, 2018.

  1. guest

    guest Guest

    CertUtil.exe Could Allow Attackers To Download Malware While Bypassing AV
    April 4, 2018
    https://www.bleepingcomputer.com/ne...ckers-to-download-malware-while-bypassing-av/
     
  2. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    I am wondering if any MitigationOptions might be beneficial here. Particularly, Arbitrary Code Guard (ACG) should stop the dynamic code modification. Possibly NoRemoteImages as well but I am not sure. I may have to test this later and try various options out of curiosity. It's great and easy to block this via Application Whitelisting solutions, but I am always curious to find multiple methods to deter certain scenarios.
     
  3. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    Wrong.
    It is not present in Windows XP.
     
  4. trott3r

    trott3r Registered Member

    Joined:
    Jan 21, 2010
    Posts:
    1,283
    Location:
    UK
    Is it vista and up or 7
     
  5. 142395

    142395 Guest

    I think no modification is used against CertUtil, but maybe you mean hardening initial attack vector such as browser or PDF reader? I'm not sure if blocking CertUtil completely won't cause problem.
     
  6. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Just block or monitor any outbound communication from certutil.exe in your firewall:
     
  7. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy


    https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html
     
    Last edited: Apr 8, 2018
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  9. 142395

    142395 Guest

    I have to allow mpam-*.exe, MPSigStub.exe, and CR_*.tmp\setup.exe on Windows\Temp, but I think default-deny rule of firewall will stop the attack even if attacker modified filename to match them.
     
  10. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    I have set the block of unsigned processes.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.