CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry

Detects changes to the "Ports" registry key with data that includes a Windows path or a file with a suspicious extension. This could be an attempt to exploit CVE-2020-1048 - a Windows Print Spooler elevation of privilege vulnerability.

Sigma rule (View on GitHub)

 1title: CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry
 2id: 7ec912f2-5175-4868-b811-ec13ad0f8567
 3status: test
 4description: |
 5    Detects changes to the "Ports" registry key with data that includes a Windows path or a file with a suspicious extension.
 6    This could be an attempt to exploit CVE-2020-1048 - a Windows Print Spooler elevation of privilege vulnerability.    
 7references:
 8    - https://windows-internals.com/printdemon-cve-2020-1048/
 9author: EagleEye Team, Florian Roth (Nextron Systems), NVISO
10date: 2020-05-13
11modified: 2024-03-25
12tags:
13    - attack.persistence
14    - attack.execution
15    - attack.defense-evasion
16    - attack.t1112
17    - cve.2020-1048
18    - detection.emerging-threats
19logsource:
20    product: windows
21    category: registry_set
22detection:
23    selection:
24        TargetObject|contains: '\Microsoft\Windows NT\CurrentVersion\Ports'
25        Details|contains:
26            - '.bat'
27            - '.com'
28            - '.dll'
29            - '.exe'
30            - '.ps1'
31            - '.vbe'
32            - '.vbs'
33            - 'C:'
34    condition: selection
35falsepositives:
36    - New printer port install on host
37level: high

References

Related rules

to-top