Detection rules › Sigma

New Port Forwarding Rule Added Via Netsh.EXE

Severity
medium
Author
Florian Roth (Nextron Systems), omkar72, oscd.community, Swachchhanda Shrawan Poudel
Source
upstream

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1090 Proxy

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection_img

or:
Image|endswith: '\netsh.exe'
OriginalFileName: netsh.exe

Stage 2: 1 of selection_cli_1

CommandLine|contains: add
CommandLine|contains: interface
CommandLine|contains: portproxy
CommandLine|contains: v4tov4

Stage 3: 1 of selection_cli_2

CommandLine|contains: 'a '
CommandLine|contains: 'i '
CommandLine|contains: 'p '
CommandLine|contains: 'v '

Stage 4: 1 of selection_cli_3

CommandLine|contains: 'c='
CommandLine|contains: connectp
CommandLine|contains: listena

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • a
  • add corpus 16 (sigma 16)
  • c=
  • connectp
  • i
  • interface
  • listena
  • p
  • portproxy
  • v
  • v4tov4
Imageends_with
  • \netsh.exe corpus 16 (sigma 16)
OriginalFileNameeq
  • netsh.exe corpus 14 (sigma 14)