Files
sigma-rules/rta/scrobj_com_hijack.py
T
2022-09-08 12:50:39 -04:00

38 lines
1.1 KiB
Python

# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
# Name: COM Hijack via Script Object
# RTA: scrobj_com_hijack.py
# ATT&CK: T1122
# Description: Modifies the Registry to create a new user-defined COM broker, "scrobj.dll".
from . import common
from . import RtaMetadata
metadata = RtaMetadata(
uuid="ac739578-c978-429f-9454-0bbe82f993f4",
platforms=["windows"],
endpoint=[],
siem=[{"rule_id": "16a52c14-7883-47af-8745-9357803f0d4c", "rule_name": "Component Object Model Hijacking"}],
techniques=["T1546"],
)
@common.requires_os(metadata.platforms)
def main():
key = "SOFTWARE\\Classes\\CLSID\\{00000000-0000-0000-0000-0000DEADBEEF}"
subkey = "InprocServer32"
value = ""
scrobj = "C:\\WINDOWS\\system32\\scrobj.dll"
key_path = key + "\\" + subkey
with common.temporary_reg(common.HKCU, key_path, value, scrobj, pause=True):
pass
if __name__ == "__main__":
exit(main())