
Summary
This detection rule is aimed at identifying suspicious behavior related to the Windows print spooler process (spoolsv.exe). It triggers when spoolsv.exe is launched as a child process from an unexpected parent process, which deviates from its typical behavior where it should be spawned by services.exe, the expected parent. Unusual parent processes can indicate security threats such as process injection, hollowing, or masquerading. The rule utilizes a Snowflake query to monitor streams of Windows process events, particularly looking for instances of spoolsv.exe execution that do not align with the anticipated parent process. Such deviations may suggest an attacker trying to manipulate or exploit the print spooler service for nefarious purposes.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1036.004
- T1055
Created: 2024-02-09