Component Object Model Hijacking - Vault7 trick

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This detection looks for the very specific value of "Attribute" in the "ShellFolder" CLSID of a COM object. This value (0xf090013d) seems to only link back to this specific persistence method. The blog post linked here (https://www.ired.team/offensive-security/code-execution/forcing-iexplore.exe-to-load-a-malicious-dll-via-com-abuse) provides more background on the meaning of this value.

Attribute Value
Type Analytic Rule
Solution FalconFriday
ID 1aaff41f-4e18-45b1-bb34-de6eb4943cf2
Severity Medium
Status Available
Kind Scheduled
Tactics Persistence, PrivilegeEscalation
Techniques T1546.015
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
DeviceRegistryEvents ActionType == "RegistryValueSet" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to FalconFriday