Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
name: Potential port monitor or print processor persistence via registry modification
id: de04ae6b-8141-41af-9baa-15630b5954cc
version: 1.0.0
description: |
Identifies port monitor or print process registry modifications that would allow
adversaries to run malicious DLLs during system boot.
labels:
tactic.id: TA0003
tactic.name: Persistence
tactic.ref: https://attack.mitre.org/tactics/TA0003/
technique.name: Boot or Logon Autostart Execution
technique.ref: https://attack.mitre.org/techniques/T1547/
subtechnique.id: T1547.010
subtechnique.name: Port Monitors
subtechnique.ref: https://attack.mitre.org/techniques/T1547/010/
references:
- https://stmxcsr.com/persistence/print-processor.html
- https://www.ired.team/offensive-security/persistence/t1013-addmonitor

condition: >
(modify_registry) and ps.sid != 'S-1-5-18'
and
registry.path imatches
(
'HKEY_LOCAL_MACHINE\\SYSTEM\\*ControlSet*\\Control\\Print\\Monitors\\*',
'HKEY_LOCAL_MACHINE\\SYSTEM\\*ControlSet*\\Control\\Print\\Environments\\Windows*\\Print Processors\\*'
)

output: >
Port monitor or print processor DLL registered under registry key %registry.path by process %ps.exe
severity: high

min-engine-version: 2.4.0