T1218.012
Verclsid
Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe (Extension CLSID Verification Host) is responsible for verifying each shell extension before it is used by Windows Explorer or the Windows Shell. Adversaries can register a malicious COM object under a CLSID and then invoke verclsid.exe with that CLSID to trigger execution. Since verclsid.exe is signed by Microsoft and performs legitimate COM verification activities, it can bypass application control solutions. Hancitor malware is a known user of this technique.
Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName =~ "verclsid.exe"
| extend HasCLSID = ProcessCommandLine matches regex @"\{[0-9A-Fa-f]{8}-[0-9A-Fa-f]{4}-[0-9A-Fa-f]{4}-[0-9A-Fa-f]{4}-[0-9A-Fa-f]{12}\}"
| extend SuspiciousParent = InitiatingProcessFileName has_any ("cmd.exe", "powershell.exe", "wscript.exe", "cscript.exe", "mshta.exe", "winword.exe", "excel.exe", "outlook.exe")
| extend ForcedExec = ProcessCommandLine has_any ("/s", "/c")
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName,
InitiatingProcessCommandLine, HasCLSID, SuspiciousParent, ForcedExec
| sort by Timestamp desc
union (
DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName =~ "verclsid.exe"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
) high severity
medium confidence
Data Sources
Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Windows Explorer and shell initialization processes that invoke verclsid.exe to verify registered shell extensions during startup
- Software that registers COM shell extensions and triggers their verification via verclsid.exe during installation
- Security software that uses verclsid.exe as part of COM extension auditing or verification workflows
- System administrators manually verifying COM shell extension CLSIDs for troubleshooting purposes
Last updated: 2026-04-13 Research depth: deep
References (5)
- https://attack.mitre.org/techniques/T1218/012/
- https://lolbas-project.github.io/lolbas/Binaries/Verclsid/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.012/T1218.012.md
- https://www.winosbit.com/articles/what-is-verclsid.exe
- https://www.proofpoint.com/us/threat-insight/post/hancitor-goes-dark
Unlock Pro Content
Get the full detection package for T1218.012 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance