Emerging Threatcriticaltest

CVE-2021-1675 Print Spooler Exploitation IPC Access

Detects remote printer driver load from Detailed File Share in Security logs that are a sign of successful exploitation attempts against print spooler vulnerability CVE-2021-1675 and CVE-2021-34527

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
INIT_6Created Fri Jul 02Updated Wed Oct 058fe1c584-ee61-444b-be21-e9054b2296942021
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic1 selector
detection:
    selection:
        EventID: 5145
        ShareName: '\\\\\*\\IPC$' # looking for the string \\*\IPC$
        RelativeTargetName: 'spoolss'
        AccessMask: '0x3'
        ObjectType: 'File'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK

Other

cve.2021-1675cve.2021-34527detection.emerging-threats
Rule Metadata
Rule ID
8fe1c584-ee61-444b-be21-e9054b229694
Status
test
Level
critical
Type
Emerging Threat
Created
Fri Jul 02
Modified
Wed Oct 05
Author
Path
rules-emerging-threats/2021/Exploits/CVE-2021-1675/win_security_exploit_cve_2021_1675_printspooler_security.yml
Raw Tags
attack.executionattack.t1569cve.2021-1675cve.2021-34527detection.emerging-threats
View on GitHub