Jump to content

murko

Members
  • Posts

    18
  • Joined

  • Last visited

Posts posted by murko

  1. 11 hours ago, itman said:

    Yes, because as far as Windows is concerned, it is conhost.exe doing the network communication.

    Now infected conhost.exe could spawn a malicious child process that could perform network communication, but that's another discussion. However, since ver. 16.2 firewall includes child process option, you're covered.

    Thanks for clarification. About the ver. 16.2 - I am bit confused, as our ESET Endpoint Security shows latest  ver. 10.1.2050.0.

  2. 3 minutes ago, itman said:

    Referring to the command line string associate with conhost.exe, it looks like packed code to me. If that's the case, no code injection occurred to conhost.exe. When conhost.exe loaded, the packed code loaded into its memory space. Then the attacker unpacked it in memory and executed it.

    In such case, would the firewall/ids rules be still effective?

  3. 2 minutes ago, itman said:

    This puppy has been flying under the radar for some time. The Reddit article is 10 months old.

    Out of curiosity, check Win add/remove programs and see if there is an entry for WindowsMalwareProtection or MicrosoftMalwareProtection

    Already checked, nothin there. Also scanned all drives for such files/folders, nothing except the mentioned before.

  4. 8 minutes ago, itman said:

    Another important detail from the Reddit article I forgot to post. It is conhost.exe that is performing the remote communication;

    Makes sense since conhost is what contains the malware code. So I will add an Eset firewall rule to block conhost.exe communication.

    Nice summary. As a preventive measure, its good to block that conhost.exe, but it doesnt solve the root of the issue - where does it came from/what causes exactly/how to detect it beforehand imho.

  5. 1 hour ago, itman said:

    As far as Autoruns goes of note is this from the Malwarebytes posting;

    Run Autoruns64.exe. Once it fully initializes, search for MicrosoftMalwareProtection and systemreset. Take a screenshot of the section where they are located. Don't modify anything yet.

    This is for systemreset:

    image.thumb.png.236691e57c5c65b5287a35afb0aedc92.png

    For MicrosoftMalwareProtection there is nothing, only remotely similiar is: WindowsMalwareProtection

    image.thumb.png.c2d337717b90b623a97d60a06e1bccb4.png

  6. 24 minutes ago, itman said:

    Prior incidents of PowerShell/Agent.AEW trojan in the forum usually involved the creation of a Win service: https://forum.eset.com/topic/32255-powershellagentaew-trojan-keeps-coming-back-after-cleaning-and-reboot/?do=findComment&comment=150342 ; the service running SyncAppvPublishingServer.vbs; with the service being started via scheduled task.

    This current instance is different. It appears explorer.exe connects to the domain in question to either download the PowerShell malware or to run it remotely. In a remote PowerShell attack, the script being deployed must exist on the target device. So it is possible what is attempting to download from this domain is the script.

    SysInternal's Autoruns migh be of assistance here looking for suspect explorer.exe task running at system startup time.

    Hi, what would you need from the Autoruns?

  7. 6 hours ago, Marcos said:

    Does deleting HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{26D015BE-52F8-423E-B5A2-512B57B991A1} in safe mode make a difference?

    Also please provide me with the file c:\program files\windowsmalwareprotection\config\systemreset.exe.

    Hi, I dont have that regedit entry anymore (I ran MalwareBytes in meanwhile, there were some entries which were deleted, cant remember now). In attachment is the req file.systemreset.rar

    EDIT: MalwareBytes log:mb-results.txt

    EDIT2: It does not make any difference, the issue still persists.

  8. 3 hours ago, Marcos said:

    We are aware of an issue that could explain your situation (in short, the pool of NetBufferLists that belongs to a network card might get corrupted when we block something - i.e. that RDP in your case). We can confirm it if you send us a kernel memory dump. In the meantime, unchecking "block unsafe address after attack detection" (and reboot) should help you to mitigate the problem (although it is not 100% workaround). Or please try turning IDS off (and reboot), that should help as well.

    Hi,

    thanks for the reply. As for the kernel dump, I`ll send it when I will do the next instalation/testing of EFS - also which one you need ? Complete or small dump?

    Btw, do you have some ETA when that mentioned issue would be resolved?

    Thanks.

  9. Hello,

    we recently installed for the very first time latest EFS on our WS2016 server (simple domain server with AD services, DNS, RRaS VPN ... ) and it resulted in completely blocked network on the server side:

    - local clients cant connect to shared drives nor authenitcate on logon to domain

    - on server any attempt to test internet connection, or to ping even local clients machines fails

    - strangely enough - EFS is happily reporting that it sucessfully blocked possible RDP attack from outside (dozens of public IP addresses)

    - network utility in EFS reports blocking live IP adresses trying to connect via svchost.exe in RDP/Host role

    - none of blocked IP addresses in ESF are from our local IP addresses

    - complete disabling ESF wont change anything

    - complete disabling ESF and also Windows Firewall wont change anything

    - with or without exception in IDS for our local IP range ( starting IP/255.255.255.0 ) nothing changes

    - every test was made with complete server reboot

     

    At this point, Im really clueless what is causing such behaviour. I am completely sure that the problem is cause by EFS, since before EFS, the server was happily working for years without any hiccup.

    Only thing I am probably left with, is to uninstall EFS, but that is not solution for paying customer, right? (/sarcasm off).

     

    So, at least any meaningfull help would be nice to have.

    Thanks.

×
×
  • Create New...