title: Windows Spooler Service Suspicious Binary Load id: 02fb90de-c321-4e63-a6b9-25f4b03dfd14 status: experimental description: Detect DLL Load from Spooler Service backup folder references: - https://github.com/hhlxf/PrintNightmare - https://github.com/ly4k/SpoolFool author: FPT.EagleEye, Thomas Patzke (improvements) date: 2021/06/29 modified: 2022/02/09 logsource: category: image_load product: windows detection: selection: Image|endswith: 'spoolsv.exe' ImageLoaded|contains: - '\Windows\System32\spool\drivers\x64\3\' - '\Windows\System32\spool\drivers\x64\4\' ImageLoaded|endswith: '.dll' condition: selection falsepositives: - Loading of legitimate driver level: informational tags: - attack.persistence - attack.defense_evasion - attack.privilege_escalation - attack.t1574 - cve.2021.1675 - cve.2021.34527