321. Adversaries Use Outlook LoadMacroProviderOnBoot for Persistence

Hello everyone!

Today we'll talk about another uncommon persistence mechanism, which is not very popular, but still can be seen ITW. And it involves Modify Registry (T1112).

So, to gain persistent access to the compromised system, the adversary modified several registry entries. One of these was LoadMacroProviderOnBoot under software\microsoft\office\16.0\outlook. If enabled, it allows the automatic loading of any configured VBA macros on startup.

Worth a hunt, right?

event_type: "registryvaluesetwin"

AND

reg_key_path: "LoadMacroProviderOnBoot"

AND

reg_value_data: "0x00000001"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge