Detection of Code Signing Certificates

ID: DET0875
Domains: Enterprise
Analytics: AN2007
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN2007

Consider analyzing code signing certificates for features that may be associated with the adversary and/or their developers, such as the thumbprint, algorithm used, validity period, common name, and certificate authority. Malware repositories can also be used to identify additional samples associated with the adversary and identify patterns an adversary has used in procuring code signing certificates.
Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on related follow-on behavior, such as Code Signing or Install Root Certificate.

Log Sources
Data Component Name Channel
Malware Metadata (DC0003) Malware Repository None