T1218.008
Odbcconf
Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows configuration of Open Database Connectivity (ODBC) drivers and data source names. Like regsvr32, odbcconf.exe has a REGSVR flag that can be abused to execute DLLs (e.g., odbcconf.exe /S /A {REGSVR "C:\Users\Public\file.dll"}). Since odbcconf.exe is digitally signed by Microsoft, it can bypass application control solutions that allowlist Microsoft-signed binaries. Groups including Cobalt Group, Bumblebee malware, and Raspberry Robin have leveraged this technique for DLL execution.
Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "odbcconf.exe"
| extend REGSVRFlag = ProcessCommandLine has "REGSVR"
| extend SuspiciousPath = ProcessCommandLine has_any ("Temp", "AppData", "Downloads", "Public", "Desktop", "ProgramData")
| extend RemoteLoad = ProcessCommandLine has_any ("http://", "https://", "\\\\")
| extend SilentFlag = ProcessCommandLine has_any ("/S", "/silent")
| extend SuspiciousParent = InitiatingProcessFileName has_any ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe", "mshta.exe")
| where REGSVRFlag or RemoteLoad or (SuspiciousPath and SuspiciousParent)
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName,
InitiatingProcessCommandLine, REGSVRFlag, SuspiciousPath, RemoteLoad, SilentFlag, SuspiciousParent
| sort by Timestamp desc high severity
high confidence
Data Sources
Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Legitimate ODBC driver installation procedures that use odbcconf.exe /A {REGSVR ...} to register ODBC drivers from vendor paths
- Database connectivity software (Oracle, SQL Server, MySQL) that registers ODBC drivers via odbcconf.exe during installation
- IT administration scripts that configure ODBC data sources for database applications
- Enterprise applications with custom ODBC drivers that register them via odbcconf.exe
Last updated: 2026-04-19 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1218/008/
- https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/
- https://docs.microsoft.com/en-us/sql/odbc/odbcconf-exe
- https://blog.trendmicro.com/trendlabs-security-intelligence/cobalt-spam-runs-use-macros-cve-2017-8759-exploit/
- https://www.cybereason.com/blog/threat-alert-bumblebee-malware
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.008/T1218.008.md
Unlock Pro Content
Get the full detection package for T1218.008 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance