Uncommon New Firewall Rule Added In Windows Firewall Exception List

Detects when a rule has been added to the Windows Firewall exception list

Sigma rule (View on GitHub)

 1title: Uncommon New Firewall Rule Added In Windows Firewall Exception List
 2id: cde0a575-7d3d-4a49-9817-b8004a7bf105
 3status: experimental
 4description: Detects when a rule has been added to the Windows Firewall exception list
 5references:
 6    - https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)
 7author: frack113
 8date: 2022-02-19
 9modified: 2024-08-29
10tags:
11    - attack.defense-evasion
12    - attack.t1562.004
13logsource:
14    product: windows
15    service: firewall-as
16detection:
17    selection:
18        EventID:
19            - 2004 # A rule has been added to the Windows Defender Firewall exception list
20            - 2071 # A rule has been added to the Windows Defender Firewall exception list. (Windows 11)
21            - 2097
22    filter_main_block:
23        Action: 2 # Block
24    filter_main_generic:
25        ApplicationPath|startswith:
26            - 'C:\Program Files (x86)\'
27            - 'C:\Program Files\'
28            - 'C:\Windows\System32\'
29            - 'C:\Windows\SysWOW64\'
30            - 'C:\Windows\WinSxS\'
31    filter_optional_msmpeng:
32        ModifyingApplication|startswith: 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
33        ModifyingApplication|endswith: '\MsMpEng.exe'
34    filter_main_covered_paths:
35        # This filter is added to avoid duplicate alerting from 9e2575e7-2cb9-4da1-adc8-ed94221dca5e
36        ApplicationPath|contains:
37            - 'C:\PerfLogs\'
38            - 'C:\Temp\'
39            - 'C:\Tmp\'
40            - 'C:\Users\Public\'
41            - 'C:\Windows\Tasks\'
42            - 'C:\Windows\Temp\'
43            - '\AppData\Local\Temp\'
44    filter_optional_no_path:
45        # This filter filters a lot of FPs related to Windows Services
46        ModifyingApplication:
47            - 'C:\Windows\System32\svchost.exe'
48            - 'C:\Windows\System32\dllhost.exe'
49        ApplicationPath: ''
50    filter_main_null:
51        ApplicationPath: null
52    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
53level: medium

References

Related rules

to-top