
Summary
This detection rule focuses on identifying potential persistence mechanisms facilitated through the COM hijacking technique via the `scrobj.dll` dynamic link library. The `scrobj.dll` file is well-known for its ability to execute scripts via the ScriptletURL registry key, and it can be illegitimately used by malware to maintain persistence on a compromised Windows system. The rule specifically watches for modifications in the Windows Registry that attempt to set the Default value of the InprocServer32 key for `scrobj.dll`, which could indicate malicious intent. This detection is crucial for monitoring and responding to threats that leverage registry abnormalities as part of the attack lifecycle. By analyzing the changes associated with `scrobj.dll`, security teams can proactively mitigate risks associated with persistent threats.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
ATT&CK Techniques
- T1546.015
Created: 2022-08-20