sigma |
sysmon_suspicious_remote_thread.yml |
- '\spoolsv.exe' |
DRL 1.0 |
sigma |
file_delete_win_cve_2021_1675_printspooler_del.yml |
Image\|endswith: 'spoolsv.exe' |
DRL 1.0 |
sigma |
file_event_win_creation_system_file.yml |
- '\spoolsv.exe' |
DRL 1.0 |
sigma |
image_load_spoolsv_dll_load.yml |
Image\|endswith: 'spoolsv.exe' |
DRL 1.0 |
sigma |
proc_creation_win_abusing_debug_privilege.yml |
- '\spoolsv.exe' |
DRL 1.0 |
sigma |
proc_creation_win_susp_spoolsv_child_processes.yml |
description: Detects suspicious print spool service (spoolsv.exe) child processes. |
DRL 1.0 |
sigma |
proc_creation_win_susp_spoolsv_child_processes.yml |
spoolsv: |
DRL 1.0 |
sigma |
proc_creation_win_susp_spoolsv_child_processes.yml |
ParentImage\|endswith: \\spoolsv.exe |
DRL 1.0 |
sigma |
proc_creation_win_susp_spoolsv_child_processes.yml |
condition: spoolsv and ( |
DRL 1.0 |
sigma |
proc_creation_win_system_exe_anomaly.yml |
- '\spoolsv.exe' |
DRL 1.0 |
sigma |
registry_event_add_port_monitor.yml |
Image: 'C:\Windows\System32\spoolsv.exe' |
DRL 1.0 |
sigma |
registry_event_asep_reg_keys_modification_currentcontrolset.yml |
Image: 'C:\Windows\System32\spoolsv.exe' |
DRL 1.0 |
atomic-red-team |
T1489.md |
This technique was used by WannaCry. Upon execution, if the spoolsv service was running “SUCCESS: The process “spoolsv.exe” with PID 2316 has been terminated.” |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1489.md |
will be displayed. If the service was not running “ERROR: The process “spoolsv.exe” not found.” will be displayed and it can be |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1489.md |
| process_name | Name of a process to kill | String | spoolsv.exe| |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1547.010.md |
<blockquote>Adversaries may use port monitors to run an attacker supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL can be located in C:\Windows\System32 and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions. (Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors . |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1547.010.md |
Add key-value pair to a Windows Port Monitor registry. On the subsequent reboot dll will be execute under spoolsv with NT AUTHORITY/SYSTEM privilege. |
MIT License. © 2018 Red Canary |
signature-base |
generic_anomalies.yar |
description = “Detects uncommon file size of spoolsv.exe” |
CC BY-NC 4.0 |
signature-base |
generic_anomalies.yar |
and filename == “spoolsv.exe” |
CC BY-NC 4.0 |