COM Hijack via Sdclt

Detects changes to 'HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute'

Sigma rule (View on GitHub)

 1title: COM Hijack via Sdclt
 2id: 07743f65-7ec9-404a-a519-913db7118a8d
 3status: test
 4description: Detects changes to 'HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute'
 5references:
 6    - http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass
 7    - https://www.exploit-db.com/exploits/47696
 8author: Omkar Gudhate
 9date: 2020-09-27
10modified: 2023-09-28
11tags:
12    - attack.persistence
13    - attack.defense-evasion
14    - attack.privilege-escalation
15    - attack.t1546
16    - attack.t1548
17logsource:
18    category: registry_set
19    product: windows
20detection:
21    selection:
22        TargetObject|contains: '\Software\Classes\Folder\shell\open\command\DelegateExecute'
23    condition: selection
24falsepositives:
25    - Unknown
26level: high

References

Related rules

to-top