Suspicious print processor registered

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Persistence (TA0003)

ATT&CK Technique

Boot or Logon Autostart Execution: Print Processors (T1547.012)

Severity

Medium

Description

The endpoint registered a new print processor, which may be used to gain persistence on the host by loading libraries into the time management service.

Attacker's Goals

Gain persistence using the legitimate windows print processor mechanism, which loads libraries into Windows services.

Investigative actions

  • Verify if the registered library is malicious.
  • Check if the installing software is a malicious binary.
  • Check for any suspicious network activity from svchost.exe or spoolsv.exe.