SigmaHQ/rules/windows/process_creation/win_exploit_cve_2020_1048.yml

34 lines
943 B
YAML
Raw Normal View History

title: Suspicious PrinterPorts Creation (CVE-2020-1048)
id: cc08d590-8b90-413a-aff6-31d1a99678d7
status: experimental
description: Detects new commands that add new printer port which point to suspicious file
author: EagleEye Team, Florian Roth
date: 2020/05/13
modified: 2020/05/23
references:
- https://windows-internals.com/printdemon-cve-2020-1048/
tags:
- attack.persistence
- attack.execution
- attack.t1059.001
- attack.t1086 #an old one
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains:
- 'Add-PrinterPort -Name'
selection2:
CommandLine|contains:
- '.exe'
- '.dll'
- '.bat'
selection3:
CommandLine|contains:
- 'Generic / Text Only'
condition: ( selection1 and selection2 ) or selection3
falsepositives:
- New printer port install on host
level: high