Extracting Certificates From the Windows Registry

I helped a colleague with a forensic analysis by extracting certificates from the Windows registry. In this blog post, we explain how to do this.

The Windows registry contains binary blobs, containing certificates. Like this one:

Examples of locations where certificates can be found:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates
  • HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates

Certificates, encoded in DER format, always start with value 0x30, as we explained in blog post “PowerShell Inside a Certificate? – Part 1“.

The binary blobs found inside the registry do not start with value 0x30, thus they can not be certificates. However, they do contain certificates prefixed with metadata. Searching for 0x30, we can find such a certificate:

Not all found byte sequences that start with 0x30 are valid. We searched for one starting with 30 8?. Extracting that byte sequence until the end of the binary blob, yielded the certificate my colleague was looking for:

We sought to improve this method, as it is not very precise (you have to know which sequences starting with 0x30 are not actual certificates).

Looking at several binary blobs, we started to distinguish a pattern: each certificate was prefixed by 4 bytes that encoded the length of the certificate (little-endian). And this length field was, in turn, prefixed by 8 constant bytes: 20 00 00 00 01 00 00 00.


This looks like a Type-Length-Value record (TLV). Each certificate has a type 20 00 00 00 01 00 00 00.
Python tool format-bytes.py, a free tool to parse binary data, can be used to parse TLV records, like this:

<QI means little-endian (<), unsigned long long (Q, 8 bytes), unsigned int (I, 4 bytes).
t:0 means that the type field is the first field (0 -> Q) and l:1 means that the length field is the second field (1 -> I).

We see that this binary blob contains 11 TLV records, and that the last one (11) has length 1239 and contains the certificate (type 0x100000020L).

Further research revealed that the type field is actually composed of 2 fields: a property identifier field and a reserved field, both 4 bytes long (I). Possible values for property identifier can be found on the Windows Dev Center and inside the wincrypt.h header.

This means that TLV records inside the binary blob can be parsed like this (format-bytes.py -f “tlv=f:<III,t:0,l:2” blob.bin):


For example, record 5, with type 0x0B (11 decimal) is the friendly name property id: CERT_FRIENDLY_NAME_PROP_ID


It contains the name of the issuer in UTF16.

The certificate itself is inside record 11 (property ID 0x20):

To extract the certificate, perform a binary dump (option -d) and write the output to disk.


Conclusion
TLV records appear often in binary data structures. If you recognize data inside a binary blob (like a certificate), look what data can be found in front of it. Compare several examples, and you might discover a pattern.

Certificates are stored inside the registry together with metadata, structured as TrLV records (r = reserved). The certificate itself is stored inside the record with type 0x20 (32 decimal).

About the authors
Didier Stevens is a malware expert working for NVISO. Didier is a SANS Internet Storm Center senior handler and Microsoft MVP, and has developed numerous popular tools to assist with malware analysis. You can find Didier on Twitter and LinkedIn.

Didier will be teaching a class on malicious documents for red teams at BruCON in October.

5 thoughts on “Extracting Certificates From the Windows Registry

  1. Actually, it is a sequence of blobs with header.
    Header looks like
    typedef struct _CAPI_CERT_BLOB_HEADER
    {
    DWORD PropertyId;
    DWORD Wtf;
    DWORD Length;
    BYTE Data[1];
    } CAPI_CERT_BLOB_HEADER;

    You look for block with PropertyId == 0x20, and this is actually a cert blob.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s