
Summary
This detection rule focuses on identifying potential COM hijacking attempts via the Windows registry path `HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute`. COM hijacking can allow an attacker to execute arbitrary code with the privileges of the user. The rule is triggered when there are changes to the specified registry key, which could indicate a manipulation to bypass User Account Control (UAC) mechanisms, particularly when exploited via the `sdclt.exe` application. This technique is commonly associated with privilege escalation attacks where an attacker modifies the COM object associated with a file type to control its execution. The detection mechanism looks for any modification within the defined registry key, which is crucial for malwares aiming to elevate privileges and execute malicious scripts.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2020-09-27