
Summary
This detection rule focuses on identifying modifications or additions to Component Object Model (COM) entries in the InProcServer32 registry path, which can be indicative of malicious activity. It utilizes PowerShell ScriptBlock Logging (EventCode 4104) to examine script blocks that target the InProcServer32 registry location. This technique is commonly leveraged by attackers for establishing persistence or for privilege escalation. By modifying COM objects, attackers can execute arbitrary code or maintain persistent access, so detection of such activity is crucial. The rule is designed for use in endpoint scenarios where PowerShell is used, particularly in Windows environments where such registry changes might occur.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Windows Registry
ATT&CK Techniques
- T1546
- T1546.015
- T1059
- T1059.001
Created: 2024-11-13