Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added more generic potential HKCU CLSID COM hijacking rule #5248

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

grimlockx
Copy link

Summary of the Pull Request

The existing COM hijacking rule (registry_set_persistence_com_hijacking_builtin.yml) does not explicitly target a specific registry hive, although its references revolve around hijacking attempts in HKCU only. It only monitors the InprocServer32 and LocalServer32 subkeys and is very strict regarding file paths and registry subkeys.

Attackers frequently abuse HKCU (particularly for user-level persistence) using InprocServer and LocalServer registry keys too. This new rule specifically monitors the HKCU hive for InprocServer, InprocServer32, LocalServer and LocalServer32—and notably does not enforce any file path restrictions. As a result, the only expected false positives would likely occur during the installation of new software.

Changelog

new: Potential HKCU CLSID COM Hijacking - Sysmon

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Mar 29, 2025
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @grimlockx 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant