Component Object Model (T1559.001)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. Fireeye Hunting COM June 2019
Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017. Microsoft COM
Forshaw, J. (2018, April 18). Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege. Retrieved May 3, 2018. ProjectZero File Write EoP Apr 2018
Nelson, M. (2017, November 16). Lateral Movement using Outlook's CreateObject Method and DotNetToJScript. Retrieved November 21, 2017. Enigma Outlook DCOM Lateral Movement Nov 2017
Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017. Enigma MMC20 COM Jan 2017