
Summary
This detection rule identifies suspicious child processes spawned by the print spool service (spoolsv.exe) on Windows systems. By analyzing process creation events, it flags any child process that is created by spoolsv.exe while evaluating the integrity level and specific characteristics of the child processes. Key indicators of potential compromise include the spawning of child processes that have commonly exploited binaries, such as net.exe and powershell.exe, or tools often used by attackers like curl.exe and wget.exe, especially when invoked with potentially malicious command-line arguments. Additionally, this rule looks for known privilege escalation techniques that can be executed through the print spooler service, a common target for attacks, which can lead to remote code execution (RCE). The detection is designed to balance between false positives and legitimate administrative activities, marking cases as suspicious when they match the defined criteria.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2021-07-11