heroui logo

Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE

Sigma Rules

View Source
Summary
This detection rule is designed to identify suspicious use of the Netsh command-line tool in Windows to whitelist programs in the Firewall from locations typically associated with malicious activity. The rule specifically targets the `netsh.exe` executable to see if commands containing variations of adding allowed programs to the firewall (such as `firewall add allowedprogram`) are issued. It checks the command line for typical flags and parameters that would indicate an attempt to authorize a program while examining the paths from which the programs derive. The rule flags any whitelisting commands executed from certain directories, such as system protected or common storage areas like the Recycle Bin, Temp folders, and various user directories. This behavior can often indicate an attempt to bypass established security measures, potentially allowing malicious software to operate undetected in the system.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
Created: 2020-05-25