heroui logo

HackTool - NoFilter Execution

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the execution of NoFilter, a tool that exploits the Windows Filtering Platform for privilege escalation, primarily by analyzing specific event log entries from Windows Security. The detection is based on EventID 5447 and 5449, which correspond to changes in filtering policies that include hardcoded references to 'RonPolicy'. This policy name trigger indicates potential misuse of the Filtering Platform to gain elevated privileges. For effective monitoring, it's essential that the audit of Filtering Platform Policy Changes is enabled prior to deployment. The rule aims to mitigate risks associated with privilege escalation tactics through early detection of anomalous changes in security policies. The references provided link to additional resources explaining NoFilter and its implications in the cybersecurity landscape.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
Created: 2024-01-05