Suspicious NTLM Authentication on the Printer Spooler Service

Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service

Sigma rule (View on GitHub)

 1title: Suspicious NTLM Authentication on the Printer Spooler Service
 2id: bb76d96b-821c-47cf-944b-7ce377864492
 3status: test
 4description: Detects a privilege elevation attempt by coercing NTLM authentication on the Printer Spooler service
 5references:
 6    - https://twitter.com/med0x2e/status/1520402518685200384
 7    - https://github.com/elastic/detection-rules/blob/dd224fb3f81d0b4bf8593c5f02a029d647ba2b2d/rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml
 8author: Elastic (idea), Tobias Michalski (Nextron Systems)
 9date: 2022/05/04
10modified: 2023/02/09
11tags:
12    - attack.privilege_escalation
13    - attack.credential_access
14    - attack.t1212
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection_img:
20        - Image|endswith: '\rundll32.exe'
21        - OriginalFileName: 'RUNDLL32.EXE'
22    selection_cli:
23        CommandLine|contains|all:
24            - 'C:\windows\system32\davclnt.dll,DavSetCookie'
25            - 'http'
26        CommandLine|contains:
27            - 'spoolss'
28            - 'srvsvc'
29            - '/print/pipe/'
30    condition: all of selection_*
31falsepositives:
32    - Unknown
33level: high

References

Related rules

to-top