Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Event Triggered Execution
  5. Component Object Model Hijacking

Event Triggered Execution: Component Object Model Hijacking

Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to enable interaction between software components through the operating system.[1] References to various COM objects are stored in the Registry.

Adversaries may use the COM system to insert malicious code that can be executed in place of legitimate software through hijacking the COM references and relationships as a means for persistence. Hijacking a COM object requires a change in the Registry to replace a reference to a legitimate system component which may cause that component to not work when executed. When that system component is executed through normal system operation the adversary's code will be executed instead.[2] An adversary is likely to hijack objects that are used frequently enough to maintain a consistent level of persistence, but are unlikely to break noticeable functionality within the system as to avoid system instability that could lead to detection.

One variation of COM hijacking involves abusing Type Libraries (TypeLibs), which provide metadata about COM objects, such as their interfaces and methods. Adversaries may modify Registry keys associated with TypeLibs to redirect legitimate COM object functionality to malicious scripts or payloads. Unlike traditional COM hijacking, which commonly uses local DLLs, this variation may leverage the "script:" moniker to execute remote scripts hosted on external servers.[3] This approach enables stealthy execution of code while maintaining persistence, as the remote payload would be automatically downloaded whenever the hijacked COM object is accessed.

ID: T1546.015
Sub-technique of: T1546
Platforms: Windows
Contributors: Elastic; ReliaQuest
Version: 1.3
Created: 16 March 2020
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
S0045 ADVSTORESHELL

Some variants ofADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.[4]

G0007 APT28

APT28 has used COM hijacking for persistence by replacing the legitimateMMDeviceEnumerator object with a payload.[5][6]

S0127 BBSRAT

BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList{42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.[7]

S0126 ComRAT

ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry locationHKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.[8]

S0679 Ferocious

Ferocious can use COM hijacking to establish persistence.[9]

S0044 JHUHUGIT

JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).[5][10]

S0356 KONNI

KONNI has modified ComSysApp service to load the malicious DLL payload.[11]

S0256 Mosquito

Mosquito uses COM hijacking as a method of persistence.[12]

S1050 PcShare

PcShare has created theHKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32 Registry key for persistence.[13]

S0692 SILENTTRINITY

SILENTTRINITY can add a CLSID key for payload execution throughRegistry.CurrentUser.CreateSubKey("Software\\Classes\\CLSID\\{" + clsid + "}\\InProcServer32").[14]

S1064 SVCReady

SVCReady has created theHKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} Registry key for persistence.[15]

S0670 WarzoneRAT

WarzoneRAT can perform COM hijacking by setting the path to itself to theHKCU\Software\Classes\Folder\shell\open\command key with aDelegateExecute parameter.[16]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0481Windows COM Hijacking Detection via Registry and DLL Load CorrelationAN1323

Correlate suspicious registry modifications to known COM object CLSIDs with subsequent DLL loads or unexpected binary execution paths. Detect placement of COM CLSID entries under HKEY_CURRENT_USER\Software\Classes\CLSID\ overriding default HKLM paths. Flag anomalous DLL loads traced back to hijacked COM registry changes.

References

  1. Microsoft. (n.d.). The Component Object Model. Retrieved August 18, 2016.
  2. G DATA. (2014, October). COM Object hijacking: the discreet way of persistence. Retrieved August 13, 2016.
  3. RELIAQUEST THREAT RESEARCH TEAM. (2025, April 11). Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique. Retrieved June 27, 2025.
  4. ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
  5. ESET. (2016, October). En Route with Sednit - Part 1: Approaching the Target. Retrieved November 8, 2016.
  6. ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
  7. Lee, B. Grunzweig, J. (2015, December 22). BBSRAT Attacks Targeting Russian Organizations Linked to Roaming Tiger. Retrieved August 19, 2016.
  8. Rascagneres, P. (2015, May). Tools used by the Uroburos actors. Retrieved August 18, 2016.
  1. Yamout, M. (2021, November 29). WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019. Retrieved February 1, 2022.
  2. Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
  3. Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.
  4. ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.
  5. Vrabie, V. (2020, November). Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions. Retrieved September 19, 2022.
  6. Salvati, M. (2019, August 6). SILENTTRINITY Modules. Retrieved March 24, 2022.
  7. Schlapfer, Patrick. (2022, June 6). A New Loader Gets Ready. Retrieved December 13, 2022.
  8. Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021.
×

[8]ページ先頭

©2009-2026 Movatter.jp