Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_susp_print.yml
T
2022-02-22 11:16:31 +01:00

36 lines
898 B
YAML

title: Abusing Print Executable
id: bafac3d6-7de9-4dd9-8874-4a1194b493ed
status: test
description: Attackers can use print.exe for remote file copy
author: 'Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative'
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Print.yml
- https://twitter.com/Oddvarmoe/status/985518877076541440
date: 2020/10/05
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith:
- \print.exe
CommandLine|startswith:
- print
selection2:
CommandLine|contains:
- /D
exeCondition:
CommandLine|contains:
- .exe
cmdExclude:
CommandLine|contains:
- print.exe
condition: selection1 and selection2 and exeCondition and not cmdExclude
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1218