Potential COM Objects Download Cradles Usage - Process Creation
Detects usage of COM objects that can be abused to download files in PowerShell by CLSID
Sigma rule (View on GitHub)
1title: Potential COM Objects Download Cradles Usage - Process Creation
2id: 02b64f1b-3f33-4e67-aede-ef3b0a5a8fcf
3related:
4 - id: 3c7d1587-3b13-439f-9941-7d14313dbdfe
5 type: similar
6status: test
7description: Detects usage of COM objects that can be abused to download files in PowerShell by CLSID
8references:
9 - https://learn.microsoft.com/en-us/dotnet/api/system.type.gettypefromclsid?view=net-7.0
10 - https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=57
11author: frack113
12date: 2022-12-25
13tags:
14 - attack.command-and-control
15 - attack.t1105
16logsource:
17 product: windows
18 category: process_creation
19detection:
20 selection_1:
21 CommandLine|contains: '[Type]::GetTypeFromCLSID('
22 selection_2:
23 CommandLine|contains:
24 - '0002DF01-0000-0000-C000-000000000046'
25 - 'F6D90F16-9C73-11D3-B32E-00C04F990BB4'
26 - 'F5078F35-C551-11D3-89B9-0000F81FE221'
27 - '88d96a0a-f192-11d4-a65f-0040963251e5'
28 - 'AFBA6B42-5692-48EA-8141-DC517DCF0EF1'
29 - 'AFB40FFD-B609-40A3-9828-F88BBE11E4E3'
30 - '88d96a0b-f192-11d4-a65f-0040963251e5'
31 - '2087c2f4-2cef-4953-a8ab-66779b670495'
32 - '000209FF-0000-0000-C000-000000000046'
33 - '00024500-0000-0000-C000-000000000046'
34 condition: all of selection_*
35falsepositives:
36 - Legitimate use of the library
37level: medium
References
Related rules
- AppX Package Installation Attempts Via AppInstaller.EXE
- Arbitrary File Download Via GfxDownloadWrapper.EXE
- Browser Execution In Headless Mode
- Cisco Stage Data
- Command Line Execution with Suspicious URL and AppData Strings