Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 Logo

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

0
Free
Visit Website

Vendors are notorious for including and/or leaving behind Registry artifacts that could potentially be abused by attackers for lateral movement, evasion, bypass, and persistence. CLSIDs subkeys (LocalServer32 and InprocServer32) can be enumerated to discover abandoned binary references. Interestingly, CLSIDs can be called (‘invoked’) with this command: rundll32.exe -sta {CLSID} Defensive recommendations – clean up artifacts after removal (e.g. unregister), monitor for suspicious events (e.g. rundll32.exe usage), and implement strong Application Whitelisting (AWL) policies/rules. Background Previously, I blogged about a DCOM lateral movement technique that took advantage of a missing file that was referenced in a registry Class Identifier (CLSID) subkey-value on Windows 2008/2012 hosts. After seeing the impact of that technique, the entire notion of COM (Component Object Model) & key-value path hijacking became even more fascinating to me. As such, I decided to revisit CSLIDs, LocalServer32, and InprocServer32 to (hopefully) uncover even more interesting findings. In this post, we will discuss: The purpose of CLSIDs, LocalServer32, and InprocServer32 A slight

FEATURES

ALTERNATIVES

Original SmaliHook Java source for Android cracking and reversing.

OCaml wrapper for YARA matching engine for malware identification

Python 3 tool for parsing Yara rules with ongoing development.

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

A tool for searching a Git repository for interesting content

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

Scan folders and files for crypto patterns, hacking team malware, and malicious documents using PEID signatures.