Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to enable interaction between software components through the operating system.(Citation: Microsoft Component Object Model) References to various COM objects are stored in the Registry. Adversaries may use the COM system to insert malicious code that can be executed in place of legitimate software through hijacking the CO...
BY SOURCE
PROCEDURES (7)
Auto-extracted: 4 detections for registry monitoring
Auto-extracted: 4 detections for registry
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for suspicious