heroui logo

PrintBrm ZIP Creation of Extraction

Sigma Rules

View Source
Summary
This detection rule monitors the execution of the LOLBIN (Living Off The Land Binary) PrintBrm.exe utility, specifically targeting cases where it is invoked to create or extract ZIP files. The PrintBrm.exe executable is typically associated with the Windows Print Management service and should not be run on standard workstations since its usage may indicate malicious activity such as data exfiltration or code execution, which is aligned with command-and-control patterns. The detection logic checks for the presence of PrintBrm.exe in the process creation logs, particularly looking for command-line arguments that imply ZIP file manipulation (flagged by the inclusion of '-f' and 'zip'). Given its misuse potential, monitoring for this activity is crucial for identifying and preventing unauthorized data access or control over the machine.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-05-02