"rule_text": "title: PrinterNightmare Mimikatz Driver Name\nid: ba6b9e43-1d45-4d3c-a504-1043a64c8469\nstatus: test\ndescription: Detects static QMS 810 and mimikatz driver name used by Mimikatz as exploited\n in CVE-2021-1675 and CVE-2021-34527\nreferences:\n- https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760\n- https://www.lexjansen.com/sesug/1993/SESUG93035.pdf\n- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/4464eaf0-f34f-40d5-b970-736437a21913\n- https://nvd.nist.gov/vuln/detail/cve-2021-1675\n- https://nvd.nist.gov/vuln/detail/cve-2021-34527\nauthor: Markus Neis, @markus_neis, Florian Roth\ndate: 2021-07-04\nmodified: 2023-06-12\ntags:\n- attack.execution\n- attack.t1204\n- cve.2021-1675\n- cve.2021-34527\n- detection.emerging-threats\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n TargetObject|contains:\n - \\Control\\Print\\Environments\\Windows x64\\Drivers\\Version-3\\QMS 810\\\n - \\Control\\Print\\Environments\\Windows x64\\Drivers\\Version-3\\mimikatz\n selection_alt:\n TargetObject|contains|all:\n - legitprinter\n - \\Control\\Print\\Environments\\Windows\n selection_print:\n TargetObject|contains:\n - \\Control\\Print\\Environments\n - \\CurrentVersion\\Print\\Printers\n selection_kiwi:\n TargetObject|contains:\n - Gentil Kiwi\n - mimikatz printer\n - Kiwi Legit Printer\n condition: selection or selection_alt or (selection_print and selection_kiwi)\nfalsepositives:\n- Legitimate installation of printer driver QMS 810, Texas Instruments microLaser\n printer (unlikely)\nlevel: critical\n",
0 commit comments