
Summary
The rule titled "Potential PSFactoryBuffer COM Hijacking" is designed to identify potential malicious alterations made to the Windows Registry, specifically the PSFactory COM InProcServer32 entry. Malicious actors, such as those utilizing the RomCom malware, have been known to exploit this registry path to establish persistence by registering a harmful DLL that executes during system processes. This detection employs the selection criteria that target any changes to the registry path "CLSID\{c90250f3-4d7d-4991-9b69-a5c5bc1c2ae6}\InProcServer32\(Default)"; however, it will ignore known benign entries pointed out in the filter_main, particularly the presence of the legitimate ActXPrxy.dll file. By monitoring these specific modifications, the rule serves as a critical checkpoint, preventing unauthorized persistence mechanisms often utilized for continuous access to compromised systems. Given its high-level categorization of threat severity, implementing this rule is pertinent for organizations aiming to fortify their defenses against advanced persistent threats (APTs) that leverage COM hijacking techniques.
Categories
- Endpoint
- Windows
- On-Premise
Data Sources
- Windows Registry
Created: 2023-06-07