forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
…e related rules new: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet new: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock update: New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application - Add new EID and paths update: Uncommon New Firewall Rule Added In Windows Firewall Exception List - Add new EID and paths --------- Co-authored-by: nasbench <[email protected]>
- Loading branch information
Showing
5 changed files
with
102 additions
and
4 deletions.
There are no files selected for viewing
29 changes: 29 additions & 0 deletions
29
...threat-hunting/windows/powershell/powershell_script/posh_ps_new_netfirewallrule_allow.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
title: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock | ||
id: 8d31dd2e-b582-48ca-826e-dcaa2c1ca264 | ||
related: | ||
- id: 51483085-0cba-46a8-837e-4416496d6971 | ||
type: similar | ||
status: experimental | ||
description: | | ||
Detects when a powershell script contains calls to the "New-NetFirewallRule" cmdlet in order to add a new firewall rule with an "Allow" action. | ||
references: | ||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-24---set-a-firewall-rule-using-new-netfirewallrule | ||
- https://malware.news/t/the-rhysida-ransomware-activity-analysis-and-ties-to-vice-society/72170 | ||
- https://cybersecuritynews.com/rhysida-ransomware-attacking-windows/ | ||
author: frack113 | ||
date: 2024/05/10 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562.004 | ||
- detection.threat_hunting | ||
logsource: | ||
product: windows | ||
category: ps_script | ||
definition: 'Requirements: Script Block Logging must be enabled' | ||
detection: | ||
selection: | ||
ScriptBlockText|contains: 'New-NetFirewallRule*-Action*Allow' | ||
condition: selection | ||
falsepositives: | ||
- Administrator script | ||
level: low |
35 changes: 35 additions & 0 deletions
35
...nting/windows/process_creation/proc_creation_win_powershell_new_netfirewallrule_allow.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet | ||
id: 51483085-0cba-46a8-837e-4416496d6971 | ||
related: | ||
- id: 8d31dd2e-b582-48ca-826e-dcaa2c1ca264 | ||
type: similar | ||
status: experimental | ||
description: | | ||
Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action. | ||
references: | ||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-24---set-a-firewall-rule-using-new-netfirewallrule | ||
- https://malware.news/t/the-rhysida-ransomware-activity-analysis-and-ties-to-vice-society/72170 | ||
- https://cybersecuritynews.com/rhysida-ransomware-attacking-windows/ | ||
author: frack113 | ||
date: 2024/05/03 | ||
logsource: | ||
category: process_creation | ||
product: windows | ||
detection: | ||
selection_name: | ||
- Image|endswith: | ||
- '\powershell.exe' | ||
- '\pwsh.exe' | ||
- '\powershell_ise.exe' | ||
- OriginalFileName: | ||
- 'PowerShell.EXE' | ||
- 'pwsh.dll' | ||
selection_args: | ||
CommandLine|contains|all: | ||
- 'New-NetFirewallRule ' | ||
- ' -Action ' | ||
- 'allow' | ||
condition: all of selection_* | ||
falsepositives: | ||
- Administrator script | ||
level: low |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
30 changes: 30 additions & 0 deletions
30
rules/windows/builtin/firewall_as/win_firewall_as_add_rule_wmiprvse.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
title: New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE | ||
id: eca81e8d-09e1-4d04-8614-c91f44fd0519 | ||
status: experimental | ||
description: | | ||
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). | ||
This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule". | ||
references: | ||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.004/T1562.004.md#atomic-test-24---set-a-firewall-rule-using-new-netfirewallrule | ||
- https://malware.news/t/the-rhysida-ransomware-activity-analysis-and-ties-to-vice-society/72170 | ||
- https://cybersecuritynews.com/rhysida-ransomware-attacking-windows/ | ||
author: frack113, Nasreddine Bencherchali (Nextron Systems) | ||
date: 2024/05/10 | ||
tags: | ||
- attack.defense_evasion | ||
- attack.t1562.004 | ||
logsource: | ||
product: windows | ||
service: firewall-as | ||
detection: | ||
selection: | ||
EventID: | ||
- 2004 # A rule has been added to the Windows Defender Firewall exception list | ||
- 2071 # A rule has been added to the Windows Defender Firewall exception list. (Windows 11) | ||
- 2097 | ||
Action: 3 # Allow | ||
ModifyingApplication|endswith: ':\Windows\System32\wbem\WmiPrvSE.exe' | ||
condition: selection | ||
falsepositives: | ||
- Administrator scripts or activity. | ||
level: medium |