|Registry Run Keys / Startup Folder
|Winlogon Helper DLL
|Security Support Provider
|Kernel Modules and Extensions
|XDG Autostart Entries
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation. Print processors are DLLs that are loaded by the print spooler service, spoolsv.exe, during boot.
Adversaries may abuse the print spooler service by adding print processors that load malicious DLLs at startup. A print processor can be installed through the
AddPrintProcessor API call with an account that has
SeLoadDriverPrivilege enabled. Alternatively, a print processor can be registered to the print
spooler service by adding the
HKLM\SYSTEM\[CurrentControlSet or ControlSet001]\Control\Print\Environments\[Windows architecture: e.g., Windows x64]\Print Processors\[user
defined]\Driver Registry key that points to the DLL. For the print processor to be correctly installed, it must be located in the system print-processor directory that can
be found with the
GetPrintProcessorDirectory API call. After the print processors are installed, the print spooler service, which starts during boot, must be restarted in order for them to
run. The print spooler service
runs under SYSTEM level permissions, therefore print processors installed by an adversary may run under elevated privileges.
|User Account Management
Limit user accounts that can load or unload device drivers by disabling
Monitor for unusual kernel driver installation activity that may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
Monitor for newly constructed files that may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
Monitor for abnormal DLLs that are loaded by spoolsv.exe. Print processors that do not correlate with known good software or patching may be suspicious. New print processor DLLs are written to the print processor directory.
|OS API Execution
Monitor process API calls to
|Windows Registry Key Modification
Monitor Registry writes to