Skip to content

Commit da5705d

Browse files
committed
chore(rules): Unify usage of the load_unsigned_or_untrusted_dll macro
1 parent 43176a6 commit da5705d

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

rules/persistence_suspicious_port_monitor_loaded.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Suspicious port monitor loaded
22
id: d6ab6bfa-1a97-46cb-a69a-7a6c98a699f1
3-
version: 1.0.0
3+
version: 1.0.1
44
description: |
55
Identifies the loading of an unsigned DLL by the print spool service. Adversaries may use port
66
monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
@@ -18,10 +18,8 @@ references:
1818
- https://www.ired.team/offensive-security/persistence/t1013-addmonitor
1919

2020
condition: >
21-
load_dll and ps.name ~= 'spoolsv.exe'
21+
(load_unsigned_or_untrusted_dll) and ps.name ~= 'spoolsv.exe'
2222
and
2323
thread.callstack.symbols imatches ('localspl.dll!SplAddMonitor*', 'spoolsv.exe!PrvAddMonitor*')
24-
and
25-
(image.signature.level = 'UNCHECKED' or image.signature.level = 'UNSIGNED')
2624
2725
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)