Friday, June 21, 2024

DePriMon Malware Registers Itself as Windows Default Print Monitor To Execute Commands With SYSTEM Privileges

A new malicious downloader dubbed “DePriMon” registers itself as fake Windows Default Print Monitor to achieve persistence and to execute commands as a SYSTEM user.

The DePriMon malware found to be active at least from March 2017, it was detected first in a private company based in Central Europe. It is well-written malware and the malware authors use various encryption techniques which make the analysis more difficult.

DePriMon Malware

According to ESET analysis, the malware is multi-staged, the first stage and the distribution method of the malware remain unknown at the time of writing.

The second stage of the malware loads the third stage of the malware downloader using an encrypted, hardcoded path. The second stage of the malware registers the third-stage DLL as a port monitor.

The port monitor is a DLL that registers itself under SYSTEM level permissions as a printer. It performs various tasks such as printing a document or saving the PDF file.

The second stage registers the third-stage DLL with the following registry key and value

HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\Windows Default Print Monitor
Driver = %PathToThirdStageDLL%

This registered DLL loaded by spoolsv[.]exe and executed with SYSTEM privileges at the time of system startup. It also checks the file in %system32% that the file name is the same as the third stage DLL.

Third stage malware is responsible for downloading the main payload from DePriMon’s operators. Communication with C&C server established through SSL/TLS, Secure Channel.

For making the analysis difficult the malware authors store the encrypted configuration file in a temporary folder.


DePriMon gets downloaded to memory and executed directly by using the DLL loading technique and it never stores on the disk. It is a powerful and persistent tool used to download other malware.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles