diff --git a/rules/windows/process_creation/win_netsh_allow_port_rdp.yml b/rules/windows/process_creation/win_netsh_allow_port_rdp.yml new file mode 100644 index 00000000..f2fc0607 --- /dev/null +++ b/rules/windows/process_creation/win_netsh_allow_port_rdp.yml @@ -0,0 +1,31 @@ +title: Netsh RDP Port Opening +id: 01aeb693-138d-49d2-9403-c4f52d7d3d62 +description: Detects netsh commands that opens the port 3389 used for RDP, used in Sarwent Malware +references: + - https://labs.sentinelone.com/sarwent-malware-updates-command-detonation/ +date: 2020/05/23 +tags: + - attack.command_and_control + - attack.t1076 +status: experimental +author: Sander Wiebing +logsource: + category: process_creation + product: windows +detection: + selection1: + CommandLine|contains|all: + - netsh + - firewall add portopening + - tcp 3389 + selection2: + CommandLine|contains|all: + - netsh + - advfirewall firewall add rule + - action=allow + - protocol=TCP + - localport=3389 + condition: 1 of them +falsepositives: + - Legitimate administration +level: high