SigmaHQ/rules/windows/process_creation/win_netsh_fw_add.yml

25 lines
715 B
YAML
Raw Normal View History

2019-11-12 22:12:27 +00:00
title: Netsh
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
description: Allow Incoming Connections by Port or Application on Windows Firewall
references:
- https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
- https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
date: 2019/01/29
tags:
- attack.lateral_movement
- attack.command_and_control
- attack.t1090
status: experimental
author: Markus Neis
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- '*netsh firewall add*'
condition: selection
falsepositives:
- Legitimate administration
level: medium