Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_exploit_systemnightmare.yml
T
2022-03-07 17:10:59 +01:00

25 lines
665 B
YAML

title: SystemNightmare Exploitation Script Execution
id: c01f7bd6-0c1d-47aa-9c61-187b91273a16
status: test
description: Detects the exploitation of PrinterNightmare to get a shell as LOCAL_SYSTEM
references:
- https://github.com/GossiTheDog/SystemNightmare
author: Florian Roth
date: 2021/08/11
tags:
- attack.privilege_escalation
- attack.t1068
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'printnightmare.gentilkiwi.com'
- ' /user:gentilguest '
- 'Kiwi Legit Printer'
condition: selection
falsepositives:
- Unknown
level: critical