32 lines
873 B
YAML
32 lines
873 B
YAML
|
|
title: Netsh Port or Application Allowed
|
|
author: Markus Neis, Sander Wiebing
|
|
date: 2019/01/29
|
|
description: Allow Incoming Connections by Port or Application on Windows Firewall
|
|
detection:
|
|
SELECTION_1:
|
|
EventID: 1
|
|
SELECTION_2:
|
|
Image: '*\netsh.exe'
|
|
SELECTION_3:
|
|
CommandLine: '*firewall*'
|
|
SELECTION_4:
|
|
CommandLine: '*add*'
|
|
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
|
|
falsepositives:
|
|
- Legitimate administration
|
|
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
|
|
level: medium
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
modified: 2020/09/01
|
|
references:
|
|
- https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
|
|
- https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
|
|
status: experimental
|
|
tags:
|
|
- attack.defense_evasion
|
|
- attack.t1089
|
|
- attack.t1562.004
|