Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 200

COM Hijacking

What is COM Hijacking?

COM HijackingA persistence technique that redirects a Windows Component Object Model CLSID lookup to attacker code, executing it whenever a host process instantiates that object.


COM hijacking (MITRE ATT&CK T1546.015) abuses the Windows Component Object Model registration system. Each COM object is identified by a CLSID under HKLM or HKCU; the per-user hive HKCU\Software\Classes\CLSID is searched before HKLM, so a normal user can register a malicious InProcServer32 path for a frequently used CLSID and have their DLL or scriptlet loaded by Explorer, Office, or scheduled tasks. Because the trigger is a legitimate API call (CoCreateInstance), the technique is stealthy and survives reboots. Detection focuses on new HKCU CLSID entries, unsigned DLLs in user-writable paths, and abnormal child processes of explorer.exe; defenses include audit-mode AppLocker/WDAC, Sysmon registry monitoring, and removing user write access to sensitive keys.

Examples

  1. 01

    Registering a malicious InProcServer32 under HKCU\Software\Classes\CLSID for a CLSID loaded by Explorer at logon.

  2. 02

    Hijacking a scheduled-task COM handler so a routine task loads attacker code.

Frequently asked questions

What is COM Hijacking?

A persistence technique that redirects a Windows Component Object Model CLSID lookup to attacker code, executing it whenever a host process instantiates that object. It belongs to the Attacks & Threats category of cybersecurity.

What does COM Hijacking mean?

A persistence technique that redirects a Windows Component Object Model CLSID lookup to attacker code, executing it whenever a host process instantiates that object.

How does COM Hijacking work?

COM hijacking (MITRE ATT&CK T1546.015) abuses the Windows Component Object Model registration system. Each COM object is identified by a CLSID under HKLM or HKCU; the per-user hive HKCU\Software\Classes\CLSID is searched before HKLM, so a normal user can register a malicious InProcServer32 path for a frequently used CLSID and have their DLL or scriptlet loaded by Explorer, Office, or scheduled tasks. Because the trigger is a legitimate API call (CoCreateInstance), the technique is stealthy and survives reboots. Detection focuses on new HKCU CLSID entries, unsigned DLLs in user-writable paths, and abnormal child processes of explorer.exe; defenses include audit-mode AppLocker/WDAC, Sysmon registry monitoring, and removing user write access to sensitive keys.

How do you defend against COM Hijacking?

Defences for COM Hijacking typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for COM Hijacking?

Common alternative names include: Component Object Model hijacking, CLSID hijacking.

Related terms