Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (2024)

On-Demand Webinar

For as long as security professionals have implemented advanced security controls, the bad (and good) guys always seem to find plenty of ways around them. To begin with they started using reflective memory attacks to load DLLs “by hand” thus bypassing system choke points where critical controls such as allowlisting could be enforced. That’s in addition to the usual buffer overflows and shellcodes.

But in this real training for free session I’m going to show you a very powerful method, found in the wild, to quietly download a large and functional malware (e.g. RAT, keylogger, ransomware) without depending on any unpatched vulnerability. The one big requirement is the ability to run the VBA macro in the Word document that kicks the whole thing off.

The challenge for bad guys attacking a well patched, hygienic environment with strict controls is to get a sizeable amount of code to dependably run. Let’s say you succeed in getting a VBA macro to run in a Word document you send to someone at the target organization. You can only do so much in VBA to begin with and only as long as the user keeps the document open. So, you want to quickly download a larger chuck of code and get it running in another process while it remains active. But in this security-conscious environment if you simply download evil.exe and run it, legacy application allowlisting (e.g. AppLocker) will block it because it’s not on the allowlist or signed by an authorized software vendor like Microsoft or Adobe (because we know Adobe’s code signing servers are secure, right?). Or if application allowlisting isn’t in use, a threat hunter is going to see this strange program hash showing up in the logs.

In this session I’ll show you how this evil Word document’s macro downloads an innocent looking PNG image from a legitimate website but which has some binary shell code hidden within encoded in base64. Then the macro uses a weird feature in certutil.exe (a built-in Windows program) to convert the base64 content to actual binary code and hide it in the user’s profile. The file is actually a C# project file which is then fed into MSBuild. But not to create an EXE or DLL which is what you normally use MSBuild for. That wouldn’t help us if we are attacking a well secured environment for which attack was developed. Instead it gets far more interesting. I’ll show you how a little-known feature in msbuild, called inline tasks, allows bad guys to run powerful C# code without ever loading a DLL or EXE.

You’ll also see many other techniques such as hiding malicious code inside a well-known process and how the attacker reduces their radar signature by running certutil and msbuild via a “proxy” process so that there’s no suspect process lineage as in “WTW? Why is MS Word running certutil and msbuild.”

Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (1)

To view this webinar, complete the form below.

WATCH ON-DEMAND WEBINAR

Anatomy of an Attack: How the Bad Guys Use Certutil and MSBuild to Stay Below the Radar (2024)

FAQs

What is the anatomy of an attack? ›

An attack can be broken down into 7 stages: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives.

Is certutil.exe a virus? ›

certutil.exe is an official Microsoft process it is part if the Certificate Service and if that was flagged, then that was a false positive and should not have been removed from Windows. Have you checked if that file still exists in the C:\Windows folder?

What is the anatomy of an attack and explain the stages of web application attacks? ›

The anatomy of a cyberattack has six components: reconnaissance, initial access, attack deployment, attack expansion, getting paid, and cleanup. At each phase, companies and individual users can take positive steps to protect user devices and IT systems.

In which step of the anatomy of an attack is information typically copied out to the public internet? ›

The attack phase now moves into exfiltration, the actual removal or theft of information assets. During this phase: Valuable data is typically consolidated and compressed or zipped. Data is sent to a bad actor-controlled server or data source that is available on the Internet.

How does certutil work? ›

Certutil.exe is a command-line program installed as part of Certificate Services. You can use certutil.exe to display certification authority (CA) configuration information, configure Certificate Services, and back up and restore CA components. The program also verifies certificates, key pairs, and certificate chains.

What is suspicious Certutil usage? ›

How hackers use Certutil.exe ?
  • Used to decode binaries hidden inside certificate files as Base64 information.
  • Used to download files from a given URL.
  • Used to install browser root certificates as a precursor to perform Adversary-in-the-Middle between connections to banking websites.
Jul 1, 2022

What does Certutil decode do? ›

CertUtil.exe may be used to encode and decode a file, including PE and script code. Encoding will convert a file to base64 with -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- tags. Malicious usage will include decoding a encoded file that was downloaded. Once decoded, it will be loaded by a parallel process.

What is the definition of an attack? ›

: the act of attacking with physical force or unfriendly words : assault. the victim of a knife attack. a verbal attack. 2. : a belligerent or antagonistic action.

What is the concept of attack? ›

: to act violently against (someone or something) : to try to hurt, injure, or destroy (something or someone) [+ object] He attacked the guard with a knife. Troops attacked the fortress at dawn.

What is the military definition of attack? ›

In the military, an attack is an advance of troops or the use of armed force against an enemy.

What is the meaning of physical attack? ›

Physical assault is when an individual or a group attacks a person physically, with or without the use of a weapon, or threatens to hurt that person. It can include scratching, pushing, kicking, punching, throwing things, using weapons or physically restraining another person.

Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5965

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.