cscli scenarios install sigmahq/proc_creation_win_netsh_fw_allow_program_in_susp_location
1type: trigger2name: sigmahq/proc_creation_win_netsh_fw_allow_program_in_susp_location3description: |4 Detects Netsh command execution that whitelists a program located in a suspicious location in the Windows Firewall5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && ((evt.Parsed.Image endsWith '\\netsh.exe' || evt.Parsed.OriginalFileName == 'netsh.exe') && (evt.Parsed.CommandLine contains 'firewall' && evt.Parsed.CommandLine contains 'add' && evt.Parsed.CommandLine contains 'allowedprogram' || evt.Parsed.CommandLine contains 'advfirewall' && evt.Parsed.CommandLine contains 'firewall' && evt.Parsed.CommandLine contains 'add' && evt.Parsed.CommandLine contains 'rule' && evt.Parsed.CommandLine contains 'action=allow' && evt.Parsed.CommandLine contains 'program=') && (evt.Parsed.CommandLine contains ':\\$Recycle.bin\\' || evt.Parsed.CommandLine contains ':\\RECYCLER.BIN\\' || evt.Parsed.CommandLine contains ':\\RECYCLERS.BIN\\' || evt.Parsed.CommandLine contains ':\\SystemVolumeInformation\\' || evt.Parsed.CommandLine contains ':\\Temp\\' || evt.Parsed.CommandLine contains ':\\Users\\Default\\' || evt.Parsed.CommandLine contains ':\\Users\\Desktop\\' || evt.Parsed.CommandLine contains ':\\Users\\Public\\' || evt.Parsed.CommandLine contains ':\\Windows\\addins\\' || evt.Parsed.CommandLine contains ':\\Windows\\cursors\\' || evt.Parsed.CommandLine contains ':\\Windows\\debug\\' || evt.Parsed.CommandLine contains ':\\Windows\\drivers\\' || evt.Parsed.CommandLine contains ':\\Windows\\fonts\\' || evt.Parsed.CommandLine contains ':\\Windows\\help\\' || evt.Parsed.CommandLine contains ':\\Windows\\system32\\tasks\\' || evt.Parsed.CommandLine contains ':\\Windows\\Tasks\\' || evt.Parsed.CommandLine contains ':\\Windows\\Temp\\' || evt.Parsed.CommandLine contains '\\Downloads\\' || evt.Parsed.CommandLine contains '\\Local Settings\\Temporary Internet Files\\' || evt.Parsed.CommandLine contains '\\Temporary Internet Files\\Content.Outlook\\' || evt.Parsed.CommandLine contains '%Public%\\' || evt.Parsed.CommandLine contains '%TEMP%' || evt.Parsed.CommandLine contains '%TMP%'))7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t1562.0041516 label: "Suspicious Program Location Whitelisted In Firewall Via Netsh.EXE"17 behavior : "windows:audit"18 remediation: false1920scope:21 type: ParentProcessId22 expression: evt.Parsed.ParentProcessId2324