heroui logo

Potential COM Object Hijacking Via TreatAs Subkey - Registry

Sigma Rules

View Source
Summary
This detection rule identifies potential COM object hijacking attempts that exploit the TreatAs registry subkey in Windows. Specifically, it looks for events where a key creation event occurs at certain registry paths that signify a modification of COM object handling. The significance of the TreatAs key lies in its ability to dictate how COM objects are treated by the system, which can be manipulated by attackers to redirect legitimate COM object calls to malicious ones, effectively facilitating persistence or evasion techniques. The rule checks for specific conditions where the EventType is 'CreateKey' and targets keys that contain '\TreatAs' under the CLSID or HKU registry hives. Additionally, it employs an exclusion filter for the svchost executable to minimize false positives that may arise from legitimate system processes. Given the potential impacts on system integrity and security, this rule maintains a medium alert level.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Logon Session
Created: 2019-10-23