New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

Sigma rule (View on GitHub)

 1title: New Port Forwarding Rule Added Via Netsh.EXE
 2id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614
 3status: test
 4description: Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule
 5references:
 6    - https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
 7    - https://adepts.of0x.cc/netsh-portproxy-code/
 8    - https://www.dfirnotes.net/portproxy_detection/
 9author: Florian Roth (Nextron Systems), omkar72, oscd.community, Swachchhanda Shrawan Poudel
10date: 2019-01-29
11modified: 2023-09-01
12tags:
13    - attack.lateral-movement
14    - attack.defense-evasion
15    - attack.command-and-control
16    - attack.t1090
17logsource:
18    category: process_creation
19    product: windows
20detection:
21    selection_img:
22        - Image|endswith: '\netsh.exe'
23        - OriginalFileName: 'netsh.exe'
24    selection_cli_1:
25        CommandLine|contains|all:
26            - 'interface'
27            - 'portproxy'
28            - 'add'
29            - 'v4tov4'
30    selection_cli_2:
31        CommandLine|contains|all:
32            # Example: netsh I p a v l=8001 listena=127.0.0.1 connectp=80 c=192.168.1.1
33            - 'i ' # interface
34            - 'p ' # portproxy
35            - 'a ' # add
36            - 'v ' # v4tov4
37    selection_cli_3:
38        CommandLine|contains|all:
39            - 'connectp'
40            - 'listena'
41            - 'c='
42    condition: selection_img and 1 of selection_cli_*
43falsepositives:
44    - Legitimate administration activity
45    - WSL2 network bridge PowerShell script used for WSL/Kubernetes/Docker (e.g. https://github.com/microsoft/WSL/issues/4150#issuecomment-504209723)
46level: medium

References

Related rules

to-top