321. Adversaries Use Outlook LoadMacroProviderOnBoot for Persistence
Hello everyone!
Today we'll talk about another uncommon persistence mechanism, which is not very popular, but still can be seen ITW. And it involves Modify Registry (T1112).
So, to gain persistent access to the compromised system, the adversary modified several registry entries. One of these was LoadMacroProviderOnBoot under software\microsoft\office\16.0\outlook. If enabled, it allows the automatic loading of any configured VBA macros on startup.
Worth a hunt, right?
event_type: "registryvaluesetwin"
AND
reg_key_path: "LoadMacroProviderOnBoot"
AND
reg_value_data: "0x00000001"
See you tomorrow!

Comments
Post a Comment