DCERPC SMB Spoolss Named Pipe

Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.

Sigma rule (View on GitHub)

 1title: DCERPC SMB Spoolss Named Pipe
 2id: 214e8f95-100a-4e04-bb31-ef6cba8ce07e
 3status: test
 4description: Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
 5references:
 6    - https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1
 7    - https://dirkjanm.io/a-different-way-of-abusing-zerologon/
 8    - https://twitter.com/_dirkjan/status/1309214379003588608
 9author: OTR (Open Threat Research)
10date: 2018/11/28
11modified: 2022/08/11
12tags:
13    - attack.lateral_movement
14    - attack.t1021.002
15logsource:
16    product: windows
17    service: security
18detection:
19    selection:
20        EventID: 5145
21        ShareName: '\\\\\*\\IPC$' # looking for the string \\*\IPC$
22        RelativeTargetName: spoolss
23    condition: selection
24falsepositives:
25    - 'Domain Controllers acting as printer servers too? :)'
26level: medium

References

Related rules

to-top