Port Monitors - T1547.010 (43881e51-ac74-445b-b4c6-f9f9e9bf23fe)
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor
API call to set a DLL to be loaded at startup.(Citation: AddMonitor) This DLL can be located in C:\Windows\System32
and will be loaded and run by the print spooler service, spoolsv.exe
, under SYSTEM level permissions on boot.(Citation: Bloxham)
Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to the Driver
value of an existing or new arbitrarily named subkey of HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors
. The Registry key contains entries for the following:
- Local Port
- Standard TCP/IP Port
- USB Monitor
- WSD Port
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) | Attack Pattern | Port Monitors - T1547.010 (43881e51-ac74-445b-b4c6-f9f9e9bf23fe) | Attack Pattern | 1 |