# Fileless Lateral Movement with Trapped COM Objects | IBM

Listen to this Post

Fileless lateral movement techniques are increasingly popular among attackers due to their stealthiness. IBM X-Force Red researchers, including Dylan Tran and Jimmy Bayne, discovered a method leveraging trapped COM objects for lateral movement without dropping files on disk.

How It Works

COM (Component Object Model) objects are Microsoft’s framework for enabling inter-process communication. Attackers can abuse COM objects to execute malicious code in memory, avoiding traditional file-based detection.

Key Steps:

1. Identify Vulnerable COM Objects:

  • Use tools like OleView or PowerShell to enumerate COM objects.
  • Search for objects marked as “Trapped” or misconfigured.

2. Lateral Movement via DCOM:

  • Use DCOM (Distributed COM) to trigger execution on a remote machine.
  • Example PowerShell command:
    $com = [System.Activator]::CreateInstance([type]::GetTypeFromProgID("Excel.Application", "target-ip")) 
    $com.Run("malicious_payload") 
    

3. Memory Execution:

  • Leverage PowerShell Reflection or C#’s Assembly.Load to execute payloads directly in memory.

You Should Know:

Detection & Mitigation

  • Monitor DCOM Activation:
    Get-WinEvent -LogName "Microsoft-Windows-DCOM/Operational" | Where-Object { $_.ID -eq 10001 } 
    
  • Restrict COM Permissions:
    Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Ole" -Name "MachineLaunchRestriction" -Value (New-Object System.Security.AccessControl.RegistrySecurity) 
    

Forensic Investigation

  • Check WMI and COM logs:
    Get-WinEvent -LogName "Microsoft-Windows-WMI-Activity/Operational" 
    
  • Use Sysmon (Event ID 10: ProcessAccess) to detect suspicious COM interactions.

Red Team Simulation

  • Use SharpCOM (C# tool for COM exploitation):
    SharpCOM.exe -m lateral -c "malicious_command" -t 192.168.1.100 
    

What Undercode Say:

Fileless attacks are evolving, and defenders must adapt by monitoring DCOM, WMI, and PowerShell usage. Implementing application whitelisting (AppLocker) and constrained PowerShell can help mitigate such threats.

Expected Output:

  • Detection of suspicious COM object activation.
  • Logs showing unexpected DCOM/WMI activity.
  • Blocking unauthorized remote execution via GPO.

Reference: IBM X-Force Red – Fileless Lateral Movement

References:

Reported By: Susdt Fileless – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image