File tree Expand file tree Collapse file tree 1 file changed +2
-4
lines changed
Expand file tree Collapse file tree 1 file changed +2
-4
lines changed Original file line number Diff line number Diff line change 11name : Suspicious port monitor loaded
22id : d6ab6bfa-1a97-46cb-a69a-7a6c98a699f1
3- version : 1.0.0
3+ version : 1.0.1
44description : |
55 Identifies the loading of an unsigned DLL by the print spool service. Adversaries may use port
66 monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
@@ -18,10 +18,8 @@ references:
1818 - https://www.ired.team/offensive-security/persistence/t1013-addmonitor
1919
2020condition : >
21- load_dll and ps.name ~= 'spoolsv.exe'
21+ (load_unsigned_or_untrusted_dll) and ps.name ~= 'spoolsv.exe'
2222 and
2323 thread.callstack.symbols imatches ('localspl.dll!SplAddMonitor*', 'spoolsv.exe!PrvAddMonitor*')
24- and
25- (image.signature.level = 'UNCHECKED' or image.signature.level = 'UNSIGNED')
2624
2725min-engine-version : 2.2.0
You can’t perform that action at this time.
0 commit comments