Suspicious NTLM Authentication on the Printer Spooler Service
Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service
Sigma rule (View on GitHub)
1title: Suspicious NTLM Authentication on the Printer Spooler Service
2id: bb76d96b-821c-47cf-944b-7ce377864492
3status: test
4description: Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service
5references:
6 - https://twitter.com/med0x2e/status/1520402518685200384
7 - https://github.com/elastic/detection-rules/blob/dd224fb3f81d0b4bf8593c5f02a029d647ba2b2d/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml
8author: Elastic (idea), Tobias Michalski (Nextron Systems)
9date: 2022-05-04
10modified: 2023-02-09
11tags:
12 - attack.privilege-escalation
13 - attack.credential-access
14 - attack.t1212
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_img:
20 - Image|endswith: '\rundll32.exe'
21 - OriginalFileName: 'RUNDLL32.EXE'
22 selection_cli:
23 CommandLine|contains|all:
24 - 'C:\windows\system32\davclnt.dll,DavSetCookie'
25 - 'http'
26 CommandLine|contains:
27 - 'spoolss'
28 - 'srvsvc'
29 - '/print/pipe/'
30 condition: all of selection_*
31falsepositives:
32 - Unknown
33level: high
References
Related rules
- Audit CVE Event
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- Application AppID Uri Configuration Changes
- Application URI Configuration Changes