heroui logo

Spoolsv Writing a DLL - Sysmon

Splunk Security Content

View Source
Summary
This detection rule monitors for unusual behavior from the `spoolsv.exe` process, specifically when it attempts to write a DLL file in the `\spool\drivers\x64\` directory, a practice that is atypical for this process. This behavior may signal exploitation attempts involving known vulnerabilities such as CVE-2021-34527 (PrintNightmare). The detection is based on Sysmon EventID 11, which tracks file creation events. Since `spoolsv.exe` is generally expected to operate without writing DLLs, occurrences of this event can indicate potential compromise, enabling an attacker to execute arbitrary code, escalate privileges, or ensure persistence in the targeted system. The rule requires ingestion of relevant Sysmon logs and is particularly effective in identifying such malicious activities, while also allowing for tuning to avoid false positives.
Categories
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1547.012
  • T1547
Created: 2024-11-13