title: SystemNightmare Exploitation Script Execution id: c01f7bd6-0c1d-47aa-9c61-187b91273a16 status: test description: Detects the exploitation of PrinterNightmare to get a shell as LOCAL_SYSTEM references: - https://github.com/GossiTheDog/SystemNightmare author: Florian Roth date: 2021/08/11 tags: - attack.privilege_escalation - attack.t1068 logsource: category: process_creation product: windows detection: selection: CommandLine|contains: - 'printnightmare.gentilkiwi.com' - ' /user:gentilguest ' - 'Kiwi Legit Printer' condition: selection falsepositives: - Unknown level: critical