You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$PersistenceObject=New-PersistenceObject-Hostname $hostname-Technique 'Library Abuse COM'-Classification 'MITRE ATT&CK T1546.015'-Path "$entryPath"-Value "$value"-AccessGained 'User'-Note "The library file or junction folder under .\AppData\Roaming\Microsoft\Windows\Start Menu\ in a user's folder is accessed by explorer.exe every time that user logs in and interacts with the Start Menu. This behavior could be abused to achieve persistence using the Component Object Model."-Reference 'https://attack.mitre.org/techniques/T1546/015/'
@@ -2366,6 +2418,7 @@ function Find-AllPersistence {
2366
2418
'NetshHelperDLL'=$null
2367
2419
'SetupExecute'=$null
2368
2420
'PlatformExecute'=$null
2421
+
'LibraryAbuseCOM'=$null
2369
2422
}
2370
2423
2371
2424
# Collect the keys in a separate list
@@ -2457,7 +2510,8 @@ function Find-AllPersistence {
2457
2510
Get-NetshHelperDLL
2458
2511
Get-SetupExecute
2459
2512
Get-PlatformExecute
2460
-
2513
+
Get-LibraryAbuseCOM
2514
+
2461
2515
if ($IncludeHighFalsePositivesChecks.IsPresent) {
2462
2516
Write-Verbose-Message "$hostname - You have used the -IncludeHighFalsePositivesChecks switch, this may generate a lot of false positives since it includes checks with results which are difficult to filter programmatically..."
2463
2517
Get-AppPaths
@@ -2705,6 +2759,10 @@ function Find-AllPersistence {
0 commit comments