SMB Spoolss Name Piped Usage
Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
Sigma rule (View on GitHub)
 1title: SMB Spoolss Name Piped Usage
 2id: bae2865c-5565-470d-b505-9496c87d0c30
 3status: test
 4description: Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
 5references:
 6    - https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1
 7    - https://dirkjanm.io/a-different-way-of-abusing-zerologon/
 8    - https://twitter.com/_dirkjan/status/1309214379003588608
 9author: OTR (Open Threat Research), @neu5ron
10date: 2018-11-28
11modified: 2022-10-09
12tags:
13    - attack.lateral-movement
14    - attack.t1021.002
15logsource:
16    product: zeek
17    service: smb_files
18detection:
19    selection:
20        path|endswith: 'IPC$'
21        name: spoolss
22    condition: selection
23falsepositives:
24    - Domain Controllers that are sometimes, commonly although should not be, acting as printer servers too
25level: medium
References
Related rules
- Access To ADMIN$ Network Share
 - Copy From Or To Admin Share Or Sysvol Folder
 - DCERPC SMB Spoolss Named Pipe
 - DCOM InternetExplorer.Application Iertutil DLL Hijack - Security
 - First Time Seen Remote Named Pipe