CertUtil
Windowsv1.1
Author: NVISO (@NVISOsecurity), 2thewes
description
Certutil
paths
4 paths
FileKnowledgeSystem CryptnetUrlCache
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\FileKnowledgeSystem WOW64 CryptnetUrlCache
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\FileKnowledgeUser CryptnetUrlCache
C:\Users\%user%\AppData\LocalLow\Microsoft\CryptnetUrlCache\FileKnowledgeINetCache
C:\Users\%user%\AppData\Local\Microsoft\Windows\INetCache\IE\› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: CertUtil
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. System CryptnetUrlCache
Collect-Artifact -SourcePath "C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\\*" -FolderName "System_CryptnetUrlCache"
# 2. System WOW64 CryptnetUrlCache
Collect-Artifact -SourcePath "C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\\*" -FolderName "System_WOW64_CryptnetUrlCache"
# 3. User CryptnetUrlCache
$UserPath = Join-Path $env:USERPROFILE "AppData\LocalLow\Microsoft\CryptnetUrlCache\"
Collect-Artifact -SourcePath "$UserPath\*" -FolderName "User_CryptnetUrlCache"
# 4. INetCache
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Microsoft\Windows\INetCache\IE\"
Collect-Artifact -SourcePath "$UserPath\*" -FolderName "INetCache"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.