Component Object Model and Distributed COM (T1175)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Component Object Model and Distributed COM

Associated Tactics

  • Lateral Movement
  • Execution

Lateral Movement (TA0008)

The adversary is trying to move through your environment. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective often involves pivoting through multiple systems and accounts to gain. Adversaries might install their own remote access tools to accomplish Lateral Movement or use legitimate credentials with native network and operating system tools, which may be stealthier.

View on ATT&CK

Procedure Examples

Description Source(s)
Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. Fireeye Hunting COM June 2019
Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017. Microsoft COM
Microsoft. (n.d.). DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1. Retrieved November 22, 2017. Microsoft COM ACL
Microsoft. (n.d.). Setting Process-Wide Security Through the Registry. Retrieved November 21, 2017. Microsoft Process Wide Com Keys
Microsoft. (n.d.). Registry Values for System-Wide Security. Retrieved November 21, 2017. Microsoft System Wide Com Keys
Forshaw, J. (2018, April 18). Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege. Retrieved May 3, 2018. ProjectZero File Write EoP Apr 2018
Nelson, M. (2017, November 16). Lateral Movement using Outlook's CreateObject Method and DotNetToJScript. Retrieved November 21, 2017. Enigma Outlook DCOM Lateral Movement Nov 2017
Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017. Enigma MMC20 COM Jan 2017
Nelson, M. (2017, January 23). Lateral Movement via DCOM: Round 2. Retrieved November 21, 2017. Enigma DCOM Lateral Movement Jan 2017
Nelson, M. (2017, September 11). Lateral Movement using Excel.Application and DCOM. Retrieved November 21, 2017. Enigma Excel DCOM Sept 2017
Tsukerman, P. (2017, November 8). Leveraging Excel DDE for lateral movement via DCOM. Retrieved November 21, 2017. Cyberreason DCOM DDE Lateral Movement Nov 2017