Files
blue-team-tools/rules/windows/process_creation/win_netsh_fw_add.yml
T

29 lines
862 B
YAML
Raw Normal View History

title: Netsh Port or Application Allowed
2019-11-12 23:12:27 +01:00
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
2019-11-12 23:05:36 +01:00
description: Allow Incoming Connections by Port or Application on Windows Firewall
references:
- https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
- https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
date: 2019/01/29
2020-09-02 02:34:34 +02:00
modified: 2020/09/01
2019-11-12 23:05:36 +01:00
tags:
2020-09-02 02:34:34 +02:00
- attack.defense_evasion
- attack.t1089 # an old one
- attack.t1562.004
2019-11-12 23:05:36 +01:00
status: experimental
author: Markus Neis, Sander Wiebing
2019-11-12 23:05:36 +01:00
logsource:
category: process_creation
product: windows
detection:
2020-05-25 10:13:26 +02:00
selection1:
2019-11-12 23:05:36 +01:00
CommandLine:
- '*netsh*'
2020-05-25 10:13:26 +02:00
selection2:
CommandLine:
- '*firewall add*'
2020-05-25 10:13:26 +02:00
condition: selection1 and selection2
2019-11-12 23:05:36 +01:00
falsepositives:
- Legitimate administration
level: medium