
Summary
The detection rule named 'Windows Delete or Modify System Firewall' identifies potentially malicious activities involving the deletion or modification of Windows firewall configurations via the 'netsh' utility. This rule utilizes insights from Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike's ProcessRollup2 to track command-line executions that include keywords relevant to firewall manipulation. Such activities are significant as they can signal malware behaviors, such as those exhibited by the NJRAT threat, which could manipulate firewall settings to evade security mechanisms. The detection mechanism applies a Splunk query that analyzes endpoint process data and is structured to highlight processes that exhibit deletion or modification patterns in firewall settings. If triggered, this detection can enable incident response teams to investigate and potentially remediate unauthorized changes that could compromise network security.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- User Account
ATT&CK Techniques
- T1562
- T1562.004
Created: 2024-11-13