Skip to content

Commit 8d82205

Browse files
committed
feat(rules):Potential port monitor or print processor persistence via registry modification
Identifies port monitor or print process registry modifications that would allow adversaries to run malicious DLLs during system boot.
1 parent fadd559 commit 8d82205

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: Potential port monitor or print processor persistence via registry modification
2+
id: de04ae6b-8141-41af-9baa-15630b5954cc
3+
version: 1.0.0
4+
description: |
5+
Identifies port monitor or print process registry modifications that would allow
6+
adversaries to run malicious DLLs during system boot.
7+
labels:
8+
tactic.id: TA0003
9+
tactic.name: Persistence
10+
tactic.ref: https://attack.mitre.org/tactics/TA0003/
11+
technique.name: Boot or Logon Autostart Execution
12+
technique.ref: https://attack.mitre.org/techniques/T1547/
13+
subtechnique.id: T1547.010
14+
subtechnique.name: Port Monitors
15+
subtechnique.ref: https://attack.mitre.org/techniques/T1547/010/
16+
references:
17+
- https://stmxcsr.com/persistence/print-processor.html
18+
- https://www.ired.team/offensive-security/persistence/t1013-addmonitor
19+
20+
condition: >
21+
(modify_registry) and ps.sid != 'S-1-5-18'
22+
and
23+
registry.path imatches
24+
(
25+
'HKEY_LOCAL_MACHINE\\SYSTEM\\*ControlSet*\\Control\\Print\\Monitors\\*',
26+
'HKEY_LOCAL_MACHINE\\SYSTEM\\*ControlSet*\\Control\\Print\\Environments\\Windows*\\Print Processors\\*'
27+
)
28+
29+
output: >
30+
Port monitor or print processor DLL registered under registry key %registry.path by process %ps.exe
31+
severity: high
32+
33+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)