Child Processes Of Spoolsv Exe

Description

This search looks for child processes of spoolsv.exe. This activity is associated with a POC privilege-escalation exploit associated with CVE-2018-8440. Spoolsv.exe is the process associated with the Print Spooler service in Windows and typically runs as SYSTEM.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Security Monitoring

Category

Adversary Tactics

Alert Volume

This search looks for child processes of spoolsv.exe. This activity is associated with a POC privilege-escalation exploit associated with CVE-2018-8440. Spoolsv.exe is the process associated with the Print Spooler service in Windows and typically runs as SYSTEM.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Privilege Escalation

MITRE ATT&CK Techniques

Exploitation for Privilege Escalation

Exploitation for Privilege Escalation

MITRE Threat Groups

APT28
APT32
APT33
Cobalt Group
FIN6
FIN8
PLATINUM
Threat Group-3390
Whitefly

Data Sources

Endpoint Detection and Response

   Help

Child Processes Of Spoolsv Exe Help

You must be ingesting endpoint data that tracks process activity, including parent-child relationships from your endpoints to populate the Endpoint data model in the Processes node. The command-line arguments are mapped to the "process" field in the Endpoint data model. Update the children_of_spoolsv_filter macro to filter out legitimate child processes spawned by spoolsv.exe.

   Search

Open in Search