Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_exploit_systemnightmare.yml
T

25 lines
665 B
YAML
Raw Normal View History

2021-08-11 10:10:30 +02:00
title: SystemNightmare Exploitation Script Execution
id: c01f7bd6-0c1d-47aa-9c61-187b91273a16
2022-03-07 12:39:51 +01:00
status: test
2021-08-11 10:10:30 +02:00
description: Detects the exploitation of PrinterNightmare to get a shell as LOCAL_SYSTEM
references:
- https://github.com/GossiTheDog/SystemNightmare
author: Florian Roth
date: 2021/08/11
tags:
- attack.privilege_escalation
- attack.t1068
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'printnightmare.gentilkiwi.com'
- ' /user:gentilguest '
- 'Kiwi Legit Printer'
condition: selection
falsepositives:
- Unknown
level: critical