SigmaHQ/rules/windows/process_creation/win_susp_firewall_disable.yml

27 lines
789 B
YAML
Raw Normal View History

2019-11-04 15:10:10 +00:00
title: Firewall Disabled via Netsh
2019-11-12 22:12:27 +00:00
id: 57c4bf16-227f-4394-8ec7-1b745ee061c3
2019-11-04 15:10:10 +00:00
description: Detects netsh commands that turns off the Windows firewall
references:
2019-11-12 22:12:27 +00:00
- https://www.winhelponline.com/blog/enable-and-disable-windows-firewall-quickly-using-command-line/
- https://app.any.run/tasks/210244b9-0b6b-4a2c-83a3-04bd3175d017/
2019-11-04 15:10:10 +00:00
date: 2019/11/01
modified: 2020/08/30
2019-11-04 15:10:10 +00:00
status: experimental
author: Fatih Sirin
tags:
2019-11-12 22:12:27 +00:00
- attack.defense_evasion
- attack.t1562.004
- attack.s0108
2019-11-04 15:10:10 +00:00
logsource:
2019-11-12 22:12:27 +00:00
category: process_creation
product: windows
2019-11-04 15:10:10 +00:00
detection:
2019-11-12 22:12:27 +00:00
selection:
CommandLine:
- netsh firewall set opmode mode=disable
- netsh advfirewall set * state off
condition: selection
2019-11-04 15:10:10 +00:00
falsepositives:
2019-11-12 22:12:27 +00:00
- Legitimate administration
2019-11-04 15:10:10 +00:00
level: medium