The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in target systems. It relies on manipulating Component Object Model (COM), exploiting the core architecture of Windows that enables communication between software components, by adding a new value on a specific registry key related to the COM object itself.

We studied the usage of this technique by different malware samples to pinpoint the most exploited COM objects in 2023.

Abused COM Objects

We identified the most abused COM objects by samples using MITRE’s T1546.015 technique during sandbox execution. In addition to the most abused ones, we will also highlight other abused COM objects that we found interesting.

The chart below shows the distribution of how many samples abused different COM objects for persistence:

You can find the most used COM / CLSIDs listed bellow :

CLSID – COM Objects
79FAA099-1BAE-816E-D711-115290CEE717
EBEB87A6-E151-4054-AB45-A6E094C5334B
241D7F03-9232-4024-8373-149860BE27C0
C07DB6A3-34FC-4084-BE2E-76BB9203B049
79ECA078-17FF-726B-E811-213280E5C831
22C6C651-F6EA-46BE-BC83-54E83314C67F
F4CBF20B-F634-4095-B64A-2EBCDD9E560E
57477331-126E-4FC8-B430-1C6143484AA9
C73F6F30-97A0-4AD1-A08F-540D4E9BC7B9
89565275-A714-4a43-912E-978B935EDCCC
26037A0E-7CBD-4FFF-9C63-56F2D0770214
16426152-126E-4FC8-B430-1C6143484AA9
33414471-126E-4FC8-B430-1C6143484AA9
23716116-126E-4FC8-B430-1C6143484AA9
D4D4D7B7-1774-4FE5-ABA8-4CC0B99452B4
79FEACFF-FFCE-815E-A900-316290B5B738
74A94F46-4FC5-4426-857B-FCE9D9286279

Full Article : https://blog.virustotal.com/2024/03/com-objects-hijacking.html?m=1