
Summary
The detection rule identifies potential persistence mechanisms used by adversaries to leverage port monitors for running attacker-supplied dynamic link libraries (DLLs) during system boot on Windows systems. Adversaries can exploit the Windows API AddMonitor to configure a port monitor to load their malicious DLLs, which could subsequently lead to privilege escalation or sustained access. This rule examines Windows registry settings to detect specific registry modifications related to port monitor configurations. It focuses on registry keys under 'Control\Print\Monitors\' for DLLs that may be suspicious and ensures that optional filters are applied to reduce false positives associated with legitimate software (e.g., CutePDF, VNC). The use of filters helps isolate legitimate activity from potential threats by checking against known benign software that may use similar registry keys. Given that the rule only raises an alert if the selection criteria are met without matching any of the defined optional filters, it is designed to limit false positives while effectively monitoring for registry activity that could indicate compromise through DLL loading at a system's startup.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
ATT&CK Techniques
- T1547.010
Created: 2021-12-30