<<< Hide Navigation Hide TOC >>>
Port Monitors - T1013 (1f47e2fd-fa77-4f2f-88ee-e85df308f125)
A port monitor can be set through the (Citation: AddMonitor) API call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL can be located in C:\Windows\System32
and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions. (Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors
.
The Registry key contains entries for the following:
- Local Port
- Standard TCP/IP Port
- USB Monitor
- WSD Port
Adversaries can use this technique to load malicious code at startup that will persist on system reboot and execute as SYSTEM.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Port Monitors - T1013 (1f47e2fd-fa77-4f2f-88ee-e85df308f125) | Attack Pattern | Port Monitors - T1547.010 (43881e51-ac74-445b-b4c6-f9f9e9bf23fe) | Attack Pattern | 1 |
Port Monitors - T1547.010 (43881e51-ac74-445b-b4c6-f9f9e9bf23fe) | Attack Pattern | Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) | Attack Pattern | 2 |