| sigma | sysmon_suspicious_remote_thread.yml | - '\spoolsv.exe' | DRL 1.0 | 
    
      | sigma | file_delete_win_cve_2021_1675_printspooler_del.yml | Image\|endswith: 'spoolsv.exe' | DRL 1.0 | 
    
      | sigma | file_event_win_creation_system_file.yml | - '\spoolsv.exe' | DRL 1.0 | 
    
      | sigma | image_load_spoolsv_dll_load.yml | Image\|endswith: 'spoolsv.exe' | DRL 1.0 | 
    
      | sigma | proc_creation_win_abusing_debug_privilege.yml | - '\spoolsv.exe' | DRL 1.0 | 
    
      | sigma | proc_creation_win_susp_spoolsv_child_processes.yml | description: Detects suspicious print spool service (spoolsv.exe) child processes. | DRL 1.0 | 
    
      | sigma | proc_creation_win_susp_spoolsv_child_processes.yml | spoolsv: | DRL 1.0 | 
    
      | sigma | proc_creation_win_susp_spoolsv_child_processes.yml | ParentImage\|endswith: \\spoolsv.exe | DRL 1.0 | 
    
      | sigma | proc_creation_win_susp_spoolsv_child_processes.yml | condition: spoolsv and ( | DRL 1.0 | 
    
      | sigma | proc_creation_win_system_exe_anomaly.yml | - '\spoolsv.exe' | DRL 1.0 | 
    
      | sigma | registry_event_add_port_monitor.yml | Image: 'C:\Windows\System32\spoolsv.exe' | DRL 1.0 | 
    
      | sigma | registry_event_asep_reg_keys_modification_currentcontrolset.yml | Image: 'C:\Windows\System32\spoolsv.exe' | DRL 1.0 | 
    
      | atomic-red-team | T1489.md | This technique was used by WannaCry. Upon execution, if the spoolsv service was running “SUCCESS: The process “spoolsv.exe” with PID 2316 has been terminated.” | MIT License. © 2018 Red Canary | 
    
      | atomic-red-team | T1489.md | will be displayed. If the service was not running “ERROR: The process “spoolsv.exe” not found.” will be displayed and it can be | MIT License. © 2018 Red Canary | 
    
      | atomic-red-team | T1489.md | | process_name | Name of a process to kill | String | spoolsv.exe| | MIT License. © 2018 Red Canary | 
    
      | atomic-red-team | T1547.010.md | <blockquote>Adversaries may use port monitors to run an attacker supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitorAPI call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL can be located inC:\Windows\System32and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions. (Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL toHKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. | MIT License. © 2018 Red Canary | 
    
      | atomic-red-team | T1547.010.md | Add key-value pair to a Windows Port Monitor registry. On the subsequent reboot dll will be execute under spoolsv with NT AUTHORITY/SYSTEM privilege. | MIT License. © 2018 Red Canary | 
    
      | signature-base | generic_anomalies.yar | description = “Detects uncommon file size of spoolsv.exe” | CC BY-NC 4.0 | 
    
      | signature-base | generic_anomalies.yar | and filename == “spoolsv.exe” | CC BY-NC 4.0 |