
Summary
This detection rule monitors the execution of the Windows executable verclsid.exe, specifically targeting its use to run COM (Component Object Model) objects by observing specific command-line arguments and its image name. Verclsid.exe is often utilized in attacks for its ability to load COM objects, which can be leveraged for evasion and persistence purposes. The detection relies on process creation events where the image name of the executed process ends with 'verclsid.exe' and includes command-line parameters that indicate potential malicious activity, such as '/S' (silent) or '/C' (execute command). By analyzing these parameters, the rule aims to identify attempts to exploit the COM registry structure for unauthorized actions, enhancing the security posture by flagging suspicious activities related to application execution. The rule is particularly relevant for environments where improper use of COM objects could lead to security breaches.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2020-10-09