Distributed Component Object Model
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user. The Windows Component Object Model (COM) is a component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object c...
BY SOURCE
PROCEDURES (22)
Auto-extracted: 4 detections for remote
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 2 detections for child process
Auto-extracted: 2 detections for c2
Auto-extracted: 2 detections for wmi
Auto-extracted: 2 detections for registry
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for dll hijack
Auto-extracted: 1 detections for dll hijack
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for wmi
Auto-extracted: 1 detections for dll hijack
Auto-extracted: 1 detections for credential