Skip to content

Commit 43176a6

Browse files
committed
feat(rules): Suspicious print processor loaded rule
Identifies when the print spooler service loads unsigned or untrusted DLL and the callstack pattern indicates the print processor is loaded. Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
1 parent f317da0 commit 43176a6

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
name: Suspicious print processor loaded
2+
id: 3e0f5ef7-8a0a-4604-b2bf-d09606f45483
3+
version: 1.0.0
4+
description: |
5+
Identifies when the print spooler service loads unsigned or untrusted DLL and the callstack pattern
6+
indicates the print processor is loaded. Adversaries may abuse print processors to run malicious DLLs
7+
during system boot for persistence and/or privilege escalation.
8+
labels:
9+
tactic.id: TA0003
10+
tactic.name: Persistence
11+
tactic.ref: https://attack.mitre.org/tactics/TA0003/
12+
technique.id: T1547
13+
technique.name: Boot or Logon Autostart Execution
14+
technique.ref: https://attack.mitre.org/techniques/T1547/
15+
subtechnique.id: T1547.012
16+
subtechnique.name: Print Processors
17+
subtechnique.ref: https://attack.mitre.org/techniques/T1547/012/
18+
references:
19+
- https://stmxcsr.com/persistence/print-processor.html
20+
21+
condition: >
22+
(load_unsigned_or_untrusted_dll) and ps.name ~= 'spoolsv.exe'
23+
and
24+
thread.callstack.summary imatches 'ntdll.dll|KernelBase.dll|localspl.dll|spoolsv.exe|kernel32.dll|ntdll.dll'
25+
and
26+
thread.callstack.symbols imatches ('localspl.dll!SplSetPrinterData') and thread.callstack.symbols not imatches ('KernelBase.dll!RegisterGPNotificationInternal')
27+
28+
output: >
29+
Print spooler service loaded suspicious print processor DLL %image.path
30+
severity: high
31+
32+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)