Detectionmediumtest
Certificate Exported Via PowerShell
Detects calls to cmdlets that are used to export certificates from the local certificate store. Threat actors were seen abusing this to steal private keys from compromised machines.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Thu May 189e716b33-63b2-46da-86a4-bd3c3b9b5dfbwindows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic1 selector
detection:
selection:
CommandLine|contains:
- 'Export-PfxCertificate '
- 'Export-Certificate '
condition: selectionFalse Positives
Legitimate certificate exports by administrators. Additional filters might be required.
MITRE ATT&CK
Rule Metadata
Rule ID
9e716b33-63b2-46da-86a4-bd3c3b9b5dfb
Status
test
Level
medium
Type
Detection
Created
Thu May 18
Path
rules/windows/process_creation/proc_creation_win_powershell_export_certificate.yml
Raw Tags
attack.credential-accessattack.executionattack.t1552.004attack.t1059.001