Cybercriminals Laughing All The Way To The LOLBin

Share This Post

The living-off-the-land binary (LOLBin) method is being leveraged by attackers around the globe to spread trojans and other malware.

LOLBins are native utilities that attackers can use to evade detection by blending in to normal activity patterns. In this case, Regsvr32 is a legitimate, Microsoft-signed command line utility that allows Windows users to register and unregister libraries. By registering a .DLL file, information is added to the machine’s Registry so that it can be used by Windows and other programs. Regsvr32 is being used to load COM scriptlets that can bypass application white-listing controls and execute .DLL’s. These malicious activities are usually executed using malicious macros embedded in Microsoft Office documents with Rich Text Formatting. (.docx, .docm, .xlsm, .xlsb, etc.)

Suspicious executions of Regsvr32 can be identified by looking for instances of the service with Microsoft Word or Microsoft Excel as a parent process. Other indicators are .OCX files that have been placed in the Registry, or executions of the Regsvr32 service that load a .DLL named “scrobj.dll.”

Threatpost Report: https://threatpost.com/cybercriminals-windows-utility-regsvr32-malware/178333/



Reach out to our incident response team for help

More To Explore

Information Security News – 11/17/2025

Hackers Breach Texting Service Used by New York State, Sending Hundreds of Thousands of Scam Texts Article Link: https://www.nbcnews.com/tech/security/text-scam-phone-sms-hack-message-fake-transaction-call-new-york-rcna243349 Cisco ASA Firewalls Still Under Attack;

Information Security News – 11/10/2025

You’ll Never Guess What the Most Common Passwords Are. Oh, Wait, Yes You Will Article Link: https://www.theregister.com/2025/11/06/most_common_passwords/ The Louvre’s Video Security Password Was Reportedly ‘Louvre’

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.