SMB Spoolss Name Piped Usage

Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.

Sigma rule (View on GitHub)

 1title: SMB Spoolss Name Piped Usage
 2id: bae2865c-5565-470d-b505-9496c87d0c30
 3status: test
 4description: Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
 5references:
 6    - https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1
 7    - https://dirkjanm.io/a-different-way-of-abusing-zerologon/
 8    - https://twitter.com/_dirkjan/status/1309214379003588608
 9author: OTR (Open Threat Research), @neu5ron
10date: 2018/11/28
11modified: 2022/10/09
12tags:
13    - attack.lateral_movement
14    - attack.t1021.002
15logsource:
16    product: zeek
17    service: smb_files
18detection:
19    selection:
20        path|endswith: 'IPC$'
21        name: spoolss
22    condition: selection
23falsepositives:
24    - Domain Controllers that are sometimes, commonly although should not be, acting as printer servers too
25level: medium

References

Related rules

to-top