T1218.009 - Regsvcs/Regasm

Sub-technique
Tactics:
Defense Evasion
Platforms:
Windows
Detection:
Not specified
Description:
Adversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regasm are Windows command-line utilities that are used to register .NET [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) assemblies. Both are binaries that may be digitally signed by Microsoft. (Citation: MSDN Regsvcs) (Citation: MSDN Regasm)

Both utilities may be used to bypass application control through use of attributes within the binary to specify code that should be run before registration or unregistration: <code>[ComRegisterFunction]</code> or <code>[ComUnregisterFunction]</code> respectively. The code with the registration and unregistration attributes will be executed even if the process is run under insufficient privileges and fails to execute. (Citation: LOLBAS Regsvcs)(Citation: LOLBAS Regasm)
Metadata
MITRE ID: T1218.009
STIX ID: attack-pattern--c48a67ee-b657-...
Platforms: Windows
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00