heroui logo

Windows PaperCut NG Spawn Shell

Splunk Security Content

View Source
Summary
The Windows PaperCut NG Spawn Shell detection rule identifies instances where the PaperCut NG application (pc-app.exe) spawns a shell such as cmd.exe or PowerShell. This behavior is monitored through Endpoint Detection and Response (EDR) telemetry, focusing on process creation events related to pc-app.exe as the parent process. Anomalous execution of these shells can indicate unauthorized access attempts or malicious command execution within the system. If the activity is confirmed to be malicious, it might lead to unauthorized code execution, privilege escalation, or further compromises in the networked environment. The search query utilizes Splunk's Data Models and statistics functions to filter and report these instances accurately while providing context for user actions and process flows. Such proactive monitoring is essential in mitigating risks linked to vulnerabilities in applications like PaperCut NG, especially given their recent exposure to exploitation threats.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1059
  • T1190
  • T1133
Created: 2024-12-10