Home > Cyber News > Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware
Security researchers have been observing an increasing exploitation of regsvr32.exe, which is a Windows living-off-the-land binary, shortly known as LOLBin. Some of the analyzed malware samples belong to Qbot and Lokibot, according to Uptycs researchers.

Threat Actors Abusing Regsvr32

What is regsvr32? It is a Microsoft-signed command line utility allowing users to register and unregister DLL files. When you register such a file, information is added to the Registry (or the central directory), so that the file can be used by the operating system. This way, other programs can use DLLs with ease.

But now it seems that malicious actors have discovered a way to abuse regsvr32 for loading COM scriptlets to execute DLLs. “This method does not make changes to the Registry as the COM object is not actually registered but executed,” the researchers said. The technique is also known as the Squiblydoo technique, making it possible for hackers to bypass application whitelisting during the execution phase of the attack kill chain.

The research team has observed more than 500 samples using regsvr32.exe to register .ocx files. It is noteworthy that “97% of these samples belonged to malicious Microsoft Office documents such as Excel spreadsheet files carrying .xlsb or .xlsm extensions.”

More technical details are available in the original report.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree