
Summary
This detection rule identifies instances when a Windows Firewall is disabled or modified, which is a common behavior associated with adversarial tactics aimed at bypassing security measures. Disabling the firewall can allow adversaries to establish command and control (C2) communications, facilitate lateral movement within a network, and enable data exfiltration without triggering security alerts. The rule utilizes Splunk queries to capture various events that indicate a firewall has been disabled. It looks for specific Event Codes, commands indicating the use of 'netsh', 'sc', and registry manipulations to disable the firewall. Additionally, it highlights the association with known threat actors and malware types, including APT41 and various ransomware families such as Conti and Trickbot, indicating a significant threat landscape where these tactics are employed.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1562.004
Created: 2024-02-09