Microsoft-Windows-Security-Auditing › Event 5158

Event ID 5158 — The Windows Filtering Platform has permitted a bind to a local port.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has permitted a bind to a local port.

Message #

The Windows Filtering Platform has permitted a bind to a local port.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Source Address: %3
	Source Port: %4
	Protocol: %5

Filter Information:
	Filter Run-Time ID: %6
	Layer Name: %7
	Layer Run-Time ID: %8

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5158,
    "version": 0,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-02-13T18:04:01.722250Z",
    "event_record_id": 227731,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 56
    },
    "channel": "Security",
    "computer": "PC01.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 1280,
    "Application": "\\device\\harddiskvolume1\\windows\\system32\\svchost.exe",
    "SourceAddress": "0.0.0.0",
    "SourcePort": "55355",
    "Protocol": 17,
    "FilterRTID": 0,
    "LayerName": "%%14608",
    "LayerRTID": 36
  }
}

Detection Patterns #

Community Notes #

Unexpected binds on high ports may be a prelude to data exfiltration.

References #