MaxPatrol SIEM

Detects cyberincidents that undermine cyber resilience of a company

T1562.004: Disable or Modify System Firewall

Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.

Modifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. Non-Standard Port).

Adversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds. Settings related to enabling abuse of various Remote Services may also indirectly modify firewall rules.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

remote_work: PT-CR-435: Windows_Firewall_Enable_Local_RDP: Remote access to the system via RDP was enabled mitre_attck_defense_evasion: PT-CR-1861: Firewall_Modify: Attempt to change the Windows firewall configuration web_servers_abnormal_activity: PT-CR-1972: Web_Servers_Abnormal_Activity_Defense_Evasion: An attacker can change logging parameters to hide their activity and firewall rules to advance through the network unix_mitre_attck_defense_evasion: PT-CR-1657: Unix_Firewall_Disable_Config_Modify: Firewall was disabled or its configuration was changed security_code_secret_net_lsp: PT-CR-1904: SecretNet_LSP_FW_Rule_Without_Audit_Created: A Secret Net LSP firewall rule without audit logging was created, or audit logging was disabled in a rule

Detection

IDDS0018Data source and componentFirewall: Firewall DisableDescription

Monitor for changes in the status of the system firewall such as Windows Security Auditing events 5025 (The Windows firewall service has been stopped) and 5034 (The Windows firewall driver was stopped).

IDDS0018Data source and componentFirewall: Firewall Rule ModificationDescription

Monitor for changes made to firewall rules that might allow remote communication over protocols such as SMD and RDP. Modification of firewall rules might also consider opening local ports and services for different network profiles such as public and domain.

IDDS0024Data source and componentWindows Registry: Windows Registry Key ModificationDescription

Monitor for changes made to windows Registry keys and/or values that adversaries might use to disable or modify System Firewall settings such as HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy.

IDDS0017Data source and componentCommand: Command ExecutionDescription

Monitor executed commands and arguments associated with disabling or the modification of system firewalls such as netsh advfirewall firewall set rule group="file and printer sharing" new enable=Yes,ufw disable, and ufw logging off.

Mitigation

IDM1047NameAuditDescription

Routinely check account role permissions to ensure only expected users and roles have permission to modify system firewalls.

IDM1018NameUser Account ManagementDescription

Ensure proper user permissions are in place to prevent adversaries from disabling or modifying firewall settings.

IDM1024NameRestrict Registry PermissionsDescription

Ensure proper Registry permissions are in place to prevent adversaries from disabling or modifying firewall settings.

IDM1022NameRestrict File and Directory PermissionsDescription

Ensure proper process and file permissions are in place to prevent adversaries from disabling or modifying firewall settings.