persistence/registry

persist via ShellServiceObjectDelayLoad registry key

rule:
  meta:
    name: persist via ShellServiceObjectDelayLoad registry key
    namespace: persistence/registry
    authors:
      - xpzhxhm@gmail.com
    description: Match on files using ShellServiceObjectDelayLoad to persist. Windows Explorer uses this key to load COM objects at startup, allowing malicious DLLs to execute automatically.
    scopes:
      static: function
      dynamic: span of calls
    att&ck:
      - Persistence::Event Triggered Execution::Component Object Model Hijacking [T1546.015]
    references:
      - https://blog.virustotal.com/2024/03/com-objects-hijacking.html
    examples:
      - c05ec67e75693127e5556eee229b88f93c7cef926cfe905dfd5464be9d305c94
  features:
    - and:
      - os: windows
      - or:
        - match: set registry value
        - number: 0x80000002 = HKEY_LOCAL_MACHINE
      - or:
        - string: /Software\\Microsoft\\Windows\\CurrentVersion\\ShellServiceObjectDelayLoad/i
        - string: /Software\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\ShellServiceObjectDelayLoad/i

last edited: 2026-02-26 16:44:06