
Summary
This rule detects the deletion of files associated with Windows print drivers, specifically targeting DLL files within the Print Spooler service's directories. The focus is on identifying suspicious activity that could indicate a cleanup attempt following exploitation of vulnerabilities in the Print Spooler service, notably CVE-2021-34527. The rule employs EQL (Event Query Language) to monitor deletion events that occur when they result from unusual processes, excluding legitimate processes such as 'spoolsv.exe', 'dllhost.exe', and 'explorer.exe'. It aims to highlight malicious behavior indicative of privilege escalation attempts, guiding investigators on potential threats. Key investigation steps include examining the deletion process's legitimacy, reviewing associated security logs, and ensuring timely incident response and remediation actions to restore system integrity and prevent further unauthorized access.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- File
- Process
- Network Traffic
- Application Log
- Cloud Service
ATT&CK Techniques
- T1068
Created: 2021-07-06