heroui logo

PrinterNightmare Mimikatz Driver Name

Sigma Rules

View Source
Summary
The rule aims to detect the exploitation of the PrinterNightmare vulnerabilities identified as CVE-2021-1675 and CVE-2021-34527 by flagging specific driver names and registry entries associated with Mimikatz. It focuses on identifying registry modifications in Windows environments related to the installation of specific printer drivers, particularly targeting the QMS 810 driver and Mimikatz driver name entries. The detection strategy involves multiple selections to pinpoint suspicious modifications, distinguishing between legitimate printer driver installations and potential exploitation attempts. By analyzing the `TargetObject`, the rule checks for known malicious patterns while also accounting for false positives stemming from legitimate installations. This critical detection framework is highly relevant for environments vulnerable to these CVEs.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2021-07-04