Cybercriminals Laughing All The Way To The LOLBin

Share This Post

The living-off-the-land binary (LOLBin) method is being leveraged by attackers around the globe to spread trojans and other malware.

LOLBins are native utilities that attackers can use to evade detection by blending in to normal activity patterns. In this case, Regsvr32 is a legitimate, Microsoft-signed command line utility that allows Windows users to register and unregister libraries. By registering a .DLL file, information is added to the machine’s Registry so that it can be used by Windows and other programs. Regsvr32 is being used to load COM scriptlets that can bypass application white-listing controls and execute .DLL’s. These malicious activities are usually executed using malicious macros embedded in Microsoft Office documents with Rich Text Formatting. (.docx, .docm, .xlsm, .xlsb, etc.)

Suspicious executions of Regsvr32 can be identified by looking for instances of the service with Microsoft Word or Microsoft Excel as a parent process. Other indicators are .OCX files that have been placed in the Registry, or executions of the Regsvr32 service that load a .DLL named “scrobj.dll.”

Threatpost Report: https://threatpost.com/cybercriminals-windows-utility-regsvr32-malware/178333/



Reach out to our incident response team for help

More To Explore

Information Security News – 5/12/2025

Microsoft Sets Passkeys Default for New Accounts Article Link: https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html Accenture: What We Learned When Our CEO Got Deepfaked Article Link: https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked Ghost Students Creating

Information Security News – 5/5/2025

Cloudflare Sees a Big Jump in DDoS Attacks Article Link: https://www.bleepingcomputer.com/news/security/cloudflare-mitigates-record-number-of-ddos-attacks-in-2025/ Bring Your Own Computer Trend Gives Cyber Pros Chills, Yet It’s Here to Stay

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.