heroui logo

Suspicious NTLM Authentication on the Printer Spooler Service

Sigma Rules

View Source
Summary
This detection rule identifies suspicious NTLM authentication attempts specifically targeting the Printer Spooler service, which can indicate a privilege elevation attempt. NTLM (NT LAN Manager) is an authentication protocol used in Windows systems, and its misuse may allow unauthorized access to resources. This rule utilizes process creation logs to detect when rundll32.exe is spawned with specific command line arguments indicative of NTLM relay attacks towards the Printer Spooler service. By monitoring the command line for keywords associated with the Printer Spooler, such as 'spoolss' and 'srvsvc', along with the presence of davclnt.dll, the rule can capture likely attempts at credential access or privilege escalation. The inclusion of known paths and file names thwarts potential evasion techniques common in sophisticated attacks, allowing for quick incident response to potential breaches of the Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2022-05-04