Detection rules › Sigma

Verclsid.exe Runs COM Object

Severity
medium
Author
Victor Sergeev, oscd.community
Source
upstream

Detects when verclsid.exe is used to run COM object via GUID

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1218 System Binary Proxy Execution

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\verclsid.exe'
OriginalFileName: verclsid.exe

Stage 2: all of selection_cli

CommandLine|contains: '/C'
CommandLine|contains: '/S'

Stage 3: not 1 of filter_main_runtimebroker

CommandLine|contains: 'verclsid.exe" /S /C {'
CommandLine|contains: '} /I {'
ParentImage|endswith: 'C:\Windows\System32\RuntimeBroker.exe'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • /C corpus 3 (sigma 3)
  • /S
  • verclsid.exe" /S /C {
  • } /I {
Imageends_with
  • \verclsid.exe corpus 4 (sigma 4)
OriginalFileNameeq
  • verclsid.exe
ParentImageends_with
  • C:\Windows\System32\RuntimeBroker.exe