DCERPC SMB Spoolss Named Pipe
Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
Sigma rule (View on GitHub)
1title: DCERPC SMB Spoolss Named Pipe
2id: 214e8f95-100a-4e04-bb31-ef6cba8ce07e
3status: test
4description: Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
5references:
6 - https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1
7 - https://dirkjanm.io/a-different-way-of-abusing-zerologon/
8 - https://twitter.com/_dirkjan/status/1309214379003588608
9author: OTR (Open Threat Research)
10date: 2018-11-28
11modified: 2022-08-11
12tags:
13 - attack.lateral-movement
14 - attack.t1021.002
15logsource:
16 product: windows
17 service: security
18detection:
19 selection:
20 EventID: 5145
21 ShareName: '\\\\\*\\IPC$' # looking for the string \\*\IPC$
22 RelativeTargetName: spoolss
23 condition: selection
24falsepositives:
25 - 'Domain Controllers acting as printer servers too? :)'
26level: medium
References
Related rules
- Access To ADMIN$ Network Share
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- Copy From Or To Admin Share Or Sysvol Folder
- DCOM InternetExplorer.Application Iertutil DLL Hijack - Security