Verclsid
Last updated
Last updated
Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Verification Host and responsible for verifying each shell extension before that are used by Windows Explorer or the Windows Shell.
Adversaries may abuse verclisd.exe to execute malicious payloads. This may be achieved by running verclsid.exe /S /C {{CLSID}}, where the file is referenced by a Class ID (CLSID), a unique identification number used to identify COM objects. COM payloads executed by verclsid.exe may be able to perform various malicious actions, such as loading and executing COM scriptlets (SCT) from remote servers (similar to Regsvr32). Since it is signed and native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.
Example
References:
COM Hijacking Launch ingress SCT Using xwizard.exe invoke-CLSID COM