Detection rules › Sigma

COM Hijack via Sdclt

Severity
high
Author
Omkar Gudhate
Source
upstream

Detects changes to 'HKCU\Software\Classes\Folder\shell\open\command\DelegateExecute'

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1546 Event Triggered Execution
Privilege EscalationT1546 Event Triggered Execution, T1548 Abuse Elevation Control Mechanism
Defense EvasionT1548 Abuse Elevation Control Mechanism

Event coverage

ProviderEvent IDTitle
Sysmon13RegistryEvent (Value Set)

Stages and Predicates

Stage 1: selection

TargetObject|contains: '\Software\Classes\Folder\shell\open\command\DelegateExecute'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetObjectmatch
  • \Software\Classes\Folder\shell\open\command\DelegateExecute