Detection rules › Sigma

New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application

Severity
high
Author
frack113
Source
upstream

Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1562.004 Impair Defenses: Disable or Modify System Firewall

Event coverage

ProviderEvent IDTitle
Windows-Firewall-With-Advanced-Security2004
Windows-Firewall-With-Advanced-Security2071
Windows-Firewall-With-Advanced-Security2097

Stages and Predicates

Stage 1: selection

or:
ApplicationPath|contains: ':\PerfLogs\'
ApplicationPath|contains: ':\Temp\'
ApplicationPath|contains: ':\Tmp\'
ApplicationPath|contains: ':\Users\Public\'
ApplicationPath|contains: ':\Windows\Tasks\'
ApplicationPath|contains: ':\Windows\Temp\'
ApplicationPath|contains: '\AppData\Local\Temp\'

Stage 2: not 1 of filter_main_block

Action: 2

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Actioneq
  • 2 corpus 2 (sigma 2)
ApplicationPathmatch
  • :\PerfLogs\
  • :\Temp\
  • :\Tmp\
  • :\Users\Public\
  • :\Windows\Tasks\
  • :\Windows\Temp\
  • \AppData\Local\Temp\ corpus 2 (sigma 2)

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.

Often fire together

Rules that target events appearing in the same incident timelines. They pattern-match on adjacent steps of the same TTP, so an alert from one is often paired with alerts from these. Useful for triage context and for assembling chained-detection rules.

Share event IDs (chain-detection candidates)

Rules that observe the same Windows event-ID pairs as this one. If you're authoring a multi-stage / sequence rule that spans these events, these are the existing detections that already cover one or both endpoints.