heroui logo

Spoolsv Suspicious Process Access

Splunk Security Content

View Source
Summary
The rule "Spoolsv Suspicious Process Access" detects suspicious access patterns related to the spoolsv.exe process, specifically focused on identifying potential exploitation of the PrintNightmare vulnerability (CVE-2021-34527). The detection leverages Sysmon Event Code 10 to monitor instances when spoolsv.exe accesses sensitive system files or processes, particularly rundll32.exe, which could indicate an unauthorized privilege escalation attempt. Such behavior is critical as it may lead to attackers gaining elevated privileges, allowing them further system control or compromise. The rule applies a comprehensive search string to filter logs for relevant events while offering detailed implementation guidance. Incorporating filters and tuning for known legitimate instances of spoolsv.exe is recommended to minimize false positives.
Categories
  • Endpoint
Data Sources
  • Pod
  • Windows Registry
ATT&CK Techniques
  • T1068
  • T1547.012
Created: 2024-11-13