Disable and Monitor Verclsid.exe System Binary CM0007
Disable and Monitor Verclsid.exe System Binary (CM0007)
In PlaybookDetails
- ID: CM0007
- Version: 1.0
- Created: 14 March 2025
- Modified: 14 March 2025
- Type: Disable, Examine
- Status: Active
Intended Outcome
Disabling and monitoring the Verclsid.exe system binary blocks or detects adversary defense evasion using proxy execution of code.Introduction
Verclsid.exe is known as the Extension CLSID Verification Host and can be used to verify each shell extension before use by Windows Explorer or the Windows Shell (faulty shell extensions that can cause crashes when used with explorer.exe). However, the tool can be abused to execute malicious component object model (COM) objects.Preparation
- Identify a baseline of behavior for Verclsid.exe.
- Determine necessity of permitting Verclsid.exe in the environment.
Risks
- This countermeasure can break legitimate functionality.
- Removing Verclsid.exe may result in backward compatibility issues.
Guidance
Monitor
Configure the host-based agent to monitor for:- Process execution
- Command-line parameter inspection
- Process lineage monitoring
- Monitor for network calls from the verclsid.exe binary.
Block
- Update the Windows Firewall or host-based agent to block network connections from the verclsid.exe binaries
%SystemRoot%\system32\verclsid.exe
%SystemRoot%\syswow64\verclsid.exe
References
- Microsoft Security Bulletin MS06-015 Critical Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531) | https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2006/ms06-015
- How my lack of understanding of how processes exit on Windows XP forced a security patch to be recalled | https://devblogs.microsoft.com/oldnewthing/20070504-00/?p=26983
- Verclsid.exe | https://lolbas-project.github.io/lolbas/Binaries/Verclsid/
- The missing verclsid.exe documentation | https://medium.com/falconforce/the-missing-verclsid-exe-documentation-7080757e9acf
- COM IDs & Registry keys in a nutshell | https://www.codeproject.com/Articles/1265/COM-IDs-Registry-keys-in-a-nutshell
- Hancitor | https://attack.mitre.org/software/S0499/
- ReaCOM Verclsid.md | https://github.com/homjxi0e/ReaCOM/blob/master/Classes/Verclsid.md
- Old Phishing Attacks Deploy a New Methodology: Verclsid.exe | https://redcanary.com/blog/threat-detection/verclsid-exe-threat-detection/
- ID: CM0007
- Version: 1.0
- Created: 13 March 2025
- Modified: 13 March 2025
- Type: Disable, Examine