
Summary
This detection rule targets potential exploitation attempts of privilege escalation vulnerabilities associated with the Windows Print Spooler service, specifically citing the CVE-2021-34527 vulnerability known as 'PrintNightmare'. The rule operates in Elastic's EQL (Event Query Language) and checks the Windows registry for specific modifications made by the Print Spooler process (spoolsv.exe), confirming if certain registry paths and data strings indicative of malicious activity are present. These paths typically involve malicious configurations related to the environment drivers and recognizable system files like 'kernelbase.dll' or 'user32.dll'. Given its severity rating of high and a risk score of 73, this rule emphasizes the need for immediate investigation of impacted systems to potentially avert exploitation. Note this rule has been deprecated since March 2022, making it important for users to refer to newer rules or frameworks for updated protection strategies.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1068
Created: 2021-07-06