PrinterNightmare Mimikatz Driver Name
Detects static QMS 810 and mimikatz driver name used by Mimikatz as exploited in CVE-2021-1675 and CVE-2021-34527
Sigma rule (View on GitHub)
1title: PrinterNightmare Mimikatz Driver Name
2id: ba6b9e43-1d45-4d3c-a504-1043a64c8469
3status: test
4description: Detects static QMS 810 and mimikatz driver name used by Mimikatz as exploited in CVE-2021-1675 and CVE-2021-34527
5references:
6 - https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760
7 - https://www.lexjansen.com/sesug/1993/SESUG93035.pdf
8 - https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/4464eaf0-f34f-40d5-b970-736437a21913
9 - https://nvd.nist.gov/vuln/detail/cve-2021-1675
10 - https://nvd.nist.gov/vuln/detail/cve-2021-34527
11author: Markus Neis, @markus_neis, Florian Roth
12date: 2021-07-04
13modified: 2023-06-12
14tags:
15 - attack.execution
16 - attack.t1204
17 - cve.2021-1675
18 - cve.2021-34527
19 - detection.emerging-threats
20logsource:
21 product: windows
22 category: registry_event
23detection:
24 selection:
25 TargetObject|contains:
26 - '\Control\Print\Environments\Windows x64\Drivers\Version-3\QMS 810\'
27 - '\Control\Print\Environments\Windows x64\Drivers\Version-3\mimikatz'
28 selection_alt:
29 TargetObject|contains|all:
30 - 'legitprinter'
31 - '\Control\Print\Environments\Windows'
32 selection_print:
33 TargetObject|contains:
34 - '\Control\Print\Environments'
35 - '\CurrentVersion\Print\Printers'
36 selection_kiwi:
37 TargetObject|contains:
38 - 'Gentil Kiwi'
39 - 'mimikatz printer'
40 - 'Kiwi Legit Printer'
41 condition: selection or selection_alt or (selection_print and selection_kiwi)
42falsepositives:
43 - Legitimate installation of printer driver QMS 810, Texas Instruments microLaser printer (unlikely)
44level: critical
References
Related rules
- Possible PrintNightmare Print Driver Install - CVE-2021-1675
- CVE-2021-1675 Print Spooler Exploitation IPC Access
- Antivirus PrinterNightmare CVE-2021-34527 Exploit Detection
- CVE-2021-1675 Print Spooler Exploitation Filename Pattern
- Windows Spooler Service Suspicious Binary Load