Phoenix Studio
Convert indexed Sigma rules into analyst-ready detections.
This studio is built around Phoenix's own rule corpus, not a blank editor. Search by title or rule id, choose a live sigma-cli backend, then reveal pipelines only when you actually need them.
Indexed Rules
3,707
Ready to search
Backends
17
Live from sigconverter.io
CLI Versions
10
Newest: 2.0.2
Translation Workspace
Shape the rule before it leaves Phoenix
Tune Translation
Active Rule
Possible CVE-2021-1675 Print Spooler Exploitation
Target Profile
Splunk
Splunk SPL & tstats data model queries
Format Mode
Default
Plain SPL queries
Conversion Output
Possible CVE-2021-1675 Print Spooler Exploitation
Using Splunk · Default · sigma-cli 2.0.2
Translation controls
Adjust the rule on the left, then regenerate when you want a fresh backend-native query.
BackendSplunkFormatDefaultVersion2.0.2
title: Possible CVE-2021-1675 Print Spooler Exploitation
id: 4e64668a-4da1-49f5-a8df-9e2d5b866718
status: test
description: Detects events of driver load errors in print service logs that could be a sign of successful exploitation attempts of print spooler vulnerability CVE-2021-1675
references:
- https://web.archive.org/web/20210629055600/https://github.com/hhlxf/PrintNightmare/
- https://web.archive.org/web/20210701042336/https://github.com/afwu/PrintNightmare
- https://twitter.com/fuzzyf10w/status/1410202370835898371
author: Florian Roth (Nextron Systems), KevTheHermit, fuzzyf10w, Tim Shelton
date: 2021-06-30
modified: 2022-11-15
tags:
- attack.execution
- attack.t1569
- cve.2021-1675
- detection.emerging-threats
logsource:
product: windows
service: printservice-admin
detection:
selection:
EventID: 808
ErrorCode:
- '0x45A'
- '0x7e'
keywords:
- 'The print spooler failed to load a plug-in module'
# default file names used in PoC codes
- 'MyExploit.dll'
- 'evil.dll'
- '\addCube.dll'
- '\rev.dll'
- '\rev2.dll'
- '\main64.dll'
- '\mimilib.dll'
- '\mimispool.dll'
falsepositive:
- ' registration timed out' # ex: The print spooler failed to load a plug-in module PrintConfig registration timed out
condition: (selection or keywords) and not falsepositive
falsepositives:
- Problems with printer drivers
level: high
CLI command
Copy the exact command to reproduce this translation locally.
sigma convert --without-pipeline -t splunk -f default rules-emerging-threats/2021/Exploits/CVE-2021-1675/win_exploit_cve_2021_1675_printspooler.yml