heroui logo

Execution of COM object via Xwizard

Elastic Detection Rules

View Source
Summary
The rule `Execution of COM object via Xwizard` aims to detect potentially malicious activity involving the Windows Component Object Model (COM), specifically through the use of the 'xwizard.exe' executable. This executable is commonly leveraged by threat actors to bypass security measures due to its role in executing COM objects, which facilitate inter-process communication. The detection logic revolves around identifying process start events where 'xwizard.exe' is invoked with particular attention to command-line arguments, specifically 'RunWizard' and any arbitrary arguments, while ensuring it is not executed from its legitimate paths (SysWOW64 or System32). By flagging these executions, the rule assists in recognizing potential misuse of COM objects that could be an indicator of a malicious attack. To address false positives, it includes guidance for investigating legitimate uses of 'xwizard' and potential administrative activities that need to be excluded from consideration as threats. Overall, the rule enhances the detection capabilities regarding the exploitation of COM objects by malicious entities.
Categories
  • Windows
  • Endpoint
  • On-Premise
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Logon Session
  • Network Traffic
ATT&CK Techniques
  • T1559
  • T1559.001
Created: 2021-01-20