COM Hijacking via TreatAs

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detect modification of TreatAs key to enable "rundll32.exe -sta" command

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND (OBJECTNAME endswith "TreatAs\(Default)" OR (OBJECTNAME endswith "TreatAs" AND OBJECTVALUENAME = "(Default)")) AND ((PROCESSNAME notstartswith "C:\Program Files\Common Files\Microsoft Shared\ClickToRun" OR PROCESSNAME notendswith "\OfficeClickToRun.exe") AND PROCESSNAME != "C:\Program Files\Microsoft Office\root\integration\integrator.exe,C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe" AND PROCESSNAME != "C:\Windows\system32\svchost.exe" AND PROCESSNAME != "C:\Windows\system32\msiexec.exe,C:\Windows\SysWOW64\msiexec.exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113