COM Hijack via Sdclt

Detects changes to 'HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute'

Sigma rule (View on GitHub)

 1title: COM Hijack via Sdclt
 2id: 07743f65-7ec9-404a-a519-913db7118a8d
 3status: test
 4description: Detects changes to 'HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute'
 5references:
 6    - http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass
 7    - https://www.exploit-db.com/exploits/47696
 8author: Omkar Gudhate
 9date: 2020/09/27
10modified: 2023/09/28
11tags:
12    - attack.privilege_escalation
13    - attack.t1546
14    - attack.t1548
15logsource:
16    category: registry_set
17    product: windows
18detection:
19    selection:
20        TargetObject|contains: '\Software\Classes\Folder\shell\open\command\DelegateExecute'
21    condition: selection
22falsepositives:
23    - Unknown
24level: high

References

Related rules

to-top