Skip to content

Commit

Permalink
Merge PR #5084 from @MalGamy12 - Update `COM Object Hijacking Via Mod…
Browse files Browse the repository at this point in the history
…ification Of Default System CLSID Default Value`

update: COM Object Hijacking Via Modification Of Default System CLSID Default Value - Add 2 new additional built-in COM object GUID that were seen being used for hijacking
 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
  • Loading branch information
MalGamy12 and nasbench authored Dec 1, 2024
1 parent 9367349 commit 995dac1
Showing 1 changed file with 4 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,10 @@ references:
- https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/ (idea)
- https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/
- https://blog.talosintelligence.com/uat-5647-romcom/
- https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/darkhotel-a-cluster-of-groups-united-by-common-techniques
author: Nasreddine Bencherchali (Nextron Systems)
date: 2024-07-16
modified: 2024-10-18
modified: 2024-11-19
tags:
- attack.persistence
- attack.t1546.015
Expand All @@ -36,6 +37,8 @@ detection:
- '\{ddc05a5a-351a-4e06-8eaf-54ec1bc2dcea}\'
- '\{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A}\'
- '\{F82B4EF1-93A9-4DDE-8015-F7950A1A6E31}\'
- '\{7849596a-48ea-486e-8937-a2a3009f31a9}\'
- '\{0b91a74b-ad7c-4a9d-b563-29eef9167172}\'
selection_susp_location_1:
Details|contains:
# Note: Add more suspicious paths and locations
Expand Down

0 comments on commit 995dac1

Please sign in to comment.