
Summary
The detection rule 'Abusing Print Executable' identifies potential misuse of the 'print.exe' process in Windows environments, specifically targeting remote file copy operations orchestrated by attackers. It leverages characteristics of process creation events to catch malicious instances of 'print.exe'. The rule analyzes events where the image path ends with '\print.exe' and checks if the command line starts with 'print' while containing parameters typically used for file printing (e.g., '/D' or ending with '.exe'). If the selection criteria are matched but do not include 'print.exe' as part of the command line, a potential threat is flagged. This rule is critical as 'print.exe' can often be exploited to bypass security protocols, making it a vector for data exfiltration and remote command execution. Given its potential for use in evading defenses, the implementation of this rule helps to mitigate risks associated with technologies that allow remote manipulation of resources.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-05