Kernel Exploit Executed for SYSTEM Privilege Escalation
Behavioral analysis detected exploitation of CVE-2021-34527 (PrintNightmare): a non-privileged process spawned a child process running as SYSTEM through a vulnerable Windows Print Spooler service. The exploit loaded a malicious DLL via the AddPrinterDriverEx API, granting SYSTEM-level code execution to an attacker operating as a standard domain user account on the workstation.