Hackers Exploit COM Objects for Fileless Malware Lateral Movement

In March 2025, cybersecurity researchers uncovered a sophisticated attack technique where malicious actors exploit Component Object Model (COM) objects to execute fileless malware, facilitating lateral movement across networks. This method leverages legitimate Windows functionalities to establish persistence and evade traditional security measures, representing a significant evolution in cyberattack strategies.

Understanding the Component Object Model (COM):

Developed in the early 1990s, COM is a binary interface standard integral to modern Windows operating systems. It enables modular components to interact with applications across different programming languages, providing essential functionality. However, this versatility also makes COM an attractive target for cybercriminals seeking to exploit its features for malicious purposes.

Evolution of the Attack Technique:

This attack methodology builds upon research by James Forshaw of Google Project Zero, who in February 2025 detailed a novel approach for abusing Distributed COM (DCOM) remoting technology. Forshaw’s technique allows trapped COM objects to execute .NET managed code within the context of server-side DCOM processes, potentially leading to privilege escalation and bypassing Protected Process Light (PPL) protections.

Building on Forshaw’s findings, security researchers Dylan Tran and Jimmy Bayne developed a proof-of-concept demonstrating fileless lateral movement capabilities. Their research showcases how attackers can leverage DCOM to remotely manipulate registry settings and execute malicious code without leaving obvious artifacts on disk.

Infection Mechanism:

The attack begins with the manipulation of remote registry settings to enable .NET reflection over DCOM. This is achieved by setting the `AllowDCOMReflection` and `OnlyUseLatestCLR` values in the target’s `HKLM\Software\Microsoft.NetFramework` registry path.

Attackers then exploit COM hijacking by modifying the `TreatAs` key of the `StandardFont` CLSID, redirecting execution flow. When implemented, this technique allows attackers to execute a sequence similar to:

“`c
// Parent array — object[] {}
SAFEARRAY psa;
SAFEARRAYBOUND rgsabound[1];
rgsabound[0].lLbound = 0;
rgsabound[0].cElements = 1;
psa = SafeArrayCreate(VT_VARIANT, 1, rgsabound);
“`

This approach enables the dynamic loading of malicious .NET assemblies via `Assembly.Load` over DCOM, with execution occurring entirely in memory within a Protected Process Light `svchost.exe` context. As a result, the malware resides exclusively in memory, rendering traditional file-based detection methods ineffective.

Implications and Mitigation Strategies:

The exploitation of COM objects for fileless malware execution poses significant challenges for cybersecurity defenses. By operating within legitimate Windows processes and avoiding disk-based artifacts, these attacks can evade conventional detection mechanisms.

To mitigate this emerging threat vector, security professionals recommend the following strategies:

1. Monitor CLR Load Events: Implement monitoring for Common Language Runtime (CLR) load events within `svchost.exe` processes to detect unusual activity indicative of this attack technique.

2. Detect Registry Manipulations: Establish detection mechanisms for unauthorized modifications to specific COM-related registry keys, such as changes to the `TreatAs` key of the `StandardFont` CLSID.

3. Implement Host-Based Firewall Restrictions: Configure host-based firewalls to restrict DCOM traffic, thereby limiting the potential for remote exploitation of COM objects.

4. Regularly Update and Patch Systems: Ensure that all systems are up-to-date with the latest security patches to address known vulnerabilities that could be exploited in such attacks.

5. Conduct Security Awareness Training: Educate employees about the risks associated with fileless malware and the importance of adhering to security best practices to prevent initial infection vectors.

By adopting these measures, organizations can enhance their defenses against the sophisticated exploitation of COM objects for fileless malware execution and lateral movement.