Print.exe Used to Dump Sensitive Files for Credential Access
Attackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.
Attackers are leveraging the Print.exe utility, a legitimate Windows command-line tool, to dump sensitive operating system files for credential harvesting. This technique involves using Print.exe to copy files like ntds.dit, SAM, SECURITY, and SYSTEM from their protected Windows directories. These files contain sensitive credential data that can be extracted offline. This activity was observed in relation to the SolarWinds Web Help Desk exploitation in early 2026. Abuse of Print.exe allows attackers to bypass traditional security measures that focus on blocking known malicious executables. This poses a significant risk because the extracted credentials can be used for lateral movement, privilege escalation, and data exfiltration.
Attack Chain
- The attacker gains initial access to a Windows system, potentially through exploitation of a vulnerability in a web application or via compromised credentials.
- The attacker executes
print.exewith command-line arguments specifying the source file to copy (e.g.,\config\SAM,\windows\ntds\ntds.dit) and the destination path. The/Dflag is used to designate the destination printer or file. Print.execopies the targeted sensitive file (e.g., NTDS.DIT, SAM, SECURITY, SYSTEM) from its protected location.- The copied file is typically saved to a location accessible to the attacker, either locally or on a network share.
- The attacker uses credential harvesting tools (e.g.,
secretsdump.pyfrom Impacket) to extract user credentials (hashes) from the dumped files. - The attacker cracks the password hashes or uses them directly for pass-the-hash attacks.
- Using the harvested credentials, the attacker moves laterally to other systems within the network, escalating privileges as needed.
- The attacker achieves their final objective, such as data exfiltration, deployment of ransomware, or other malicious activities.
Impact
Successful exploitation allows attackers to steal domain or local account credentials. These stolen credentials enable unauthorized access to sensitive resources, including critical systems and data. The impact can range from data breaches and financial loss to complete compromise of the affected organization’s network. While the scale of past attacks is not stated in the source, similar credential dumping attacks have led to breaches affecting millions of users.
Recommendation
- Deploy the Sigma rule
Sensitive File Dump Via Print.EXEto detect abuse ofPrint.exefor copying sensitive files (logsource:process_creation). - Monitor process creation events for the execution of
print.exewith command-line parameters that include sensitive file paths such as\config\SAM,\config\SECURITY,\config\SYSTEM, or\windows\ntds\ntds.dit(logsource:process_creation). - Implement access controls to restrict access to sensitive files like
ntds.dit,SAM,SECURITY, andSYSTEMto only authorized accounts and processes. - Investigate any instances of
print.execopying files from the\configor\windows\ntdsdirectories.
Detection coverage 2
Sensitive File Dump Via Print.EXE
highDetects the abuse of the Print.exe utility for credential harvesting by copying sensitive files.
Print.exe Executed from Suspicious Location
mediumDetects Print.exe execution from unusual directories, indicating potential misuse.
Detection queries are kept inside the platform. Get full rules →