2020-05-25 08:02:13 +00:00
|
|
|
title: Netsh Port or Application Allowed
|
2019-11-12 22:12:27 +00:00
|
|
|
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
|
2019-11-12 22:05:36 +00:00
|
|
|
description: Allow Incoming Connections by Port or Application on Windows Firewall
|
|
|
|
references:
|
|
|
|
- https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
|
|
|
|
- https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
|
|
|
|
date: 2019/01/29
|
|
|
|
tags:
|
|
|
|
- attack.lateral_movement
|
|
|
|
- attack.command_and_control
|
|
|
|
- attack.t1090
|
|
|
|
status: experimental
|
2020-05-25 08:02:13 +00:00
|
|
|
author: Markus Neis, Sander Wiebing
|
2019-11-12 22:05:36 +00:00
|
|
|
logsource:
|
|
|
|
category: process_creation
|
|
|
|
product: windows
|
|
|
|
detection:
|
2020-05-25 08:13:26 +00:00
|
|
|
selection1:
|
2019-11-12 22:05:36 +00:00
|
|
|
CommandLine:
|
2020-05-25 08:02:13 +00:00
|
|
|
- '*netsh*'
|
2020-05-25 08:13:26 +00:00
|
|
|
selection2:
|
2020-05-25 08:02:13 +00:00
|
|
|
CommandLine:
|
|
|
|
- '*firewall add*'
|
2020-05-25 08:13:26 +00:00
|
|
|
condition: selection1 and selection2
|
2019-11-12 22:05:36 +00:00
|
|
|
falsepositives:
|
|
|
|
- Legitimate administration
|
|
|
|
level: medium
|