Common Information
Type Value
Value
Component Object Model Hijacking - T1546.015
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to enable interaction between software components through the operating system.(Citation: Microsoft Component Object Model) References to various COM objects are stored in the Registry. Adversaries can use the COM system to insert malicious code that can be executed in place of legitimate software through hijacking the COM references and relationships as a means for persistence. Hijacking a COM object requires a change in the Registry to replace a reference to a legitimate system component which may cause that component to not work when executed. When that system component is executed through normal system operation the adversary's code will be executed instead.(Citation: GDATA COM Hijacking) An adversary is likely to hijack objects that are used frequently enough to maintain a consistent level of persistence, but are unlikely to break noticeable functionality within the system as to avoid system instability that could lead to detection.
Details Published Attributes CTI Title
Details Website 2024-10-08 2 DLL Hijacking, Auditing, and Detection
Details Website 2024-03-07 8 COM Objects Hijacking
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-17 92 Anomali Cyber Watch: RomCom 4.0 Targeted Female Politicians, Israeli RedAlert App Impersonated, and More. – Anomali
Details Website 2023-10-10 21 Malware Trends Report: Q3, 2023  - ANY.RUN's Cybersecurity Blog
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2023-07-25 47 Decoding RomCom: Behaviors and Opportunities for Detection
Details Website 2023-06-21 23 RedEyes Group Wiretapping Individuals (APT37) - ASEC BLOG
Details Website 2023-06-12 23 개인을 도청하는 RedEyes 그룹 (APT37) - ASEC BLOG
Details Website 2023-06-07 31 RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine
Details Website 2023-05-30 64 Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
Details Website 2023-05-30 66 Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals
Details Website 2022-11-30 2 KNOTWEED Assessment Summary — Elastic Security Labs
Details Website 2022-09-23 44 In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants
Details Website 2022-05-17 679 Space Pirates: analyzing the tools and connections of a new hacker group
Details Website 2022-01-25 95 Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Details Website 2022-01-25 95 Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Details Website 2021-04-26 5 Anatomy of Cobalt Strike’s DLL Stager
Details Website 2018-08-18 13 Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques