Jump to content

itman

Most Valued Members
  • Posts

    12,153
  • Joined

  • Last visited

  • Days Won

    319

Posts posted by itman

  1. 11 hours ago, Guest Cohee said:

    Accessing the affected hosts (an example list below) through a web browser does not result in an error due to the reasons I stated above:

    Only URL I could access w/o issue using latest ver. of Firefox was for openrouter.ai. The other two URLs resulted in;

    node_1.thumb.png.fe8a885a96f362fa31c59cd822a04aec.png

    node_2.thumb.png.0815a8be8f33ae41456af8134a01077c.png

  2. Here's a 10 year old version: https://github.com/chocolatey-archive/chocolatey/blob/master/src/helpers/functions/Get-ChocolateyWebFile.ps1 that LiveGuard immediately triggers on and submits to Eset VirusLab for analysis;

    Time;Hash;File;Size;Category;Reason;Sent to;User
    4/18/2024 1:12:42 PM;1932BE42169348A8B3727EB15F620E501C03F832;https://github.com/chocolatey-archive/chocolatey/latest-commit/master/src/helpers/functions/Get-ChocolateyWebFile.ps1;948;Script;Automatic;ESET LiveGuard; xxxxxxx

    Interestingly, appears this script has never been submitted to VirusTotal.

  3. I finally got HTTP/3 scanning to work w/o taking down my IPv6 Internet connection by pretty much rebuilding my local network - a long and arduous undertaking with some very ugly findings. Discussion on this for another day.

    @Marcos, I have searched at length on the web for some way to test if Eset HTTP/3 scanning is working properly w/o success. Since the Eset forum uses HTTP/3 is it possible you could create a HTTP/3 web document with let's say, the eicar string embedded within. Then post a link on the forum to access it?

  4. Using one of the LOLbins Project example for certutil.exe, I ran it as standard user from command prompt. It ran w/o issue;

    Cert_1.png.b83d26b68fc3e79bedfb6ab0443f89a1.png

    Of note is the downloaded file had no MotW status associated with it. This means it would not be Microsoft Defender cloud  scanned. Also, no SmartScreen detection. Only thing displayed was an UAC alert to elevate to admin since the .exe is an installer with the alert noting untrusted publisher staus;

    Cert_2.thumb.png.91cf2de8cbf82270d79adcb60039bfe1.png

  5. The certutil.exe abuse shown in the uTube video is detailed here: https://bdure.medium.com/lets-defend-suspicious-certutil-exe-usage-eventid-113-93e379611663 .

    Also, the attack is well known for sometime;

    Quote

    In 2017, Casey Smith, the same infosec researcher who told us about the risks in regsrv32, found a dual use for certutil. Smith noticed that certutil can be used to download a remote file.

    This is not completely surprising since certutil has remote capabilities, but it’s clearly not checking the format of the file — effectively turning certutil into LoL-ware version of curl.

    As it turns out, hackers were way ahead of the researchers. It was reported that Brazilians have been using certutil for some time.

    So if hackers obtain shell access through, say, an SQL injection attack, they can use certutil to download, say, a remote PowerShell script to continue the attack — without triggering any virus or malware scanners searching for obvious hacking tools.

    https://www.varonis.com/blog/the-malware-hiding-in-your-windows-system32-folder-part-iii-certutil-and-alternate-data-streams

    Eset could create an internal HIPS rule to scan for such command line usage of certutil.exe.

  6. 3 hours ago, Marcos said:

    The update is probably no longer available

    You can download the required Win 10 20H2 update from the Windows Catalog: https://www.catalog.update.microsoft.com/Search.aspx?q=kb5005611 .

    Prior to downloading and installing the update, thoroughly read this article: https://support.microsoft.com/en-us/topic/september-30-2021-kb5005611-os-builds-19041-1266-19042-1266-and-19043-1266-preview-a37f5409-f320-4175-9a66-c2682fc11c07 and verify all prerequisites are met.

  7. 1 hour ago, Lgaalvarez said:

    We detected that the XMRig miner virus entered a PC and it was very complicated to remove it, in fact this virus was AUTO EXCLUDED from the antivirus and was installed as a service.

    I don't know how the miner got installed on one of your network devices. Eset does detect the installer download: https://xmrig.com/docs/miner ;

    Quote

    Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
    4/12/2024 10:48:38 AM;HTTP filter;file;https://objects.githubusercontent.com/github-production-release-asset-2e65be/88327406/90f88b9c-a0e7-4636-8d46-3a5e9700bd95?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA/20240412/us-east-1/s3/aws4_request&X-Amz-Date=20240412T144818Z&X-Amz-Expires=300&X-Amz-Signature=a7f5e0c9b814adcdc5f33fd6d4c745d8dc59ad54cc235646d9233cfaa3e7f5bf&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=88327406&response-content-disposition=attachment; filename=xmrig-6.21.2-msvc-win64.zip&response-content-type=application/octet-stream;Win64/CoinMiner.TM potentially unwanted application;connection terminated;xxxxxxxx;Event occurred during an attempt to access the web by the application: C:\Program Files\Mozilla Firefox\firefox.exe (27BB8D2FC02CD2BBC184D07357AAA9903D88B425).;91680B78B255CE4C174E41C6D905FDBC9F5006B6;

    Of note is the Eset detection is a PUA. This means one must respond to deny its download.

  8. I did more research into HTTP/3 processing by other security solutions with the following results.

    Almost all require that HTTP/3 be disabled in the browser.

    I could only find one security solution that actually is scanning HTTP/3 and it is Avast. The result of that scanning parallels Eset results to date with multiple comments in the Avast forum about all the app processing being borked when HTTP/3 scanning is enabled.

    Kaspersky, somewhat to be expected, appears to be the only security solution handling HTTP/3 network traffic properly.  It internally blocks HTTP/3 which results in retransmission as HTTP/2 traffic. As such, no modification to internal browser HTTP/3 default setting is required.

    In my case and I believe the other poster having IPv6  connectivity being disabled w/Eset HTTP3 scanning enabled, I am fairly convinced it is due to the 6rd processing being performed by the ISP. Everything points to the UDP traffic being converted to tunneled TCP traffic in transit. Then reconverted to UDP upon access by the browser. I am not surprised about this since getting Eset to function properly with the 6rd tunneling my ISP performs has been a nightmare for the 10 years I have used Eset.

    Presently, I have disabled HTTP/3 processing in my browser and also Eset HTTP/3 scanning. It will probably remain this way for some time since I have zero confidence Eset will ever be able to resolve the 6rd tunneling conflict.

  9. 10 minutes ago, danjacoyle said:

    From the log files on one of the endpoints

    Same detection I received;

    Quote

    Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
    4/2/2024 8:37:51 AM;Real-time file system protection;file;C:\Users\xxxxxx\AppData\Local\Temp\DODD22.tmp;a variant of MSIL/Microsoft.Bing.D potentially unwanted application;deleted;NT AUTHORITY\SYSTEM;Event occurred on a file modified by the application: C:\Windows\System32\svchost.exe (445F5F38365AF88EC29B357F4696F0E3EE50A1D8).;1E908ED6CF873C77790C7EE03CE1673BF2850B92;

     

  10. 6 hours ago, Marcos said:

    We kindly ask you to reproduce the issue while capturing the network communication with Wireshark and advanced network traffic scanning enabled

    The problem is loss of IPv6 Internet connectivity doesn't happen immediately as described here: https://forum.eset.com/topic/40527-eis-17190-and-http3-scanning/?do=findComment&comment=182347 . Plus, you have to be constantly monitoring network traffic as to when this occurs.

  11. One more test and this one is the most interesting one to date.

    I created an Eset firewall rule to block any in/out network traffic for UDP, remote ports 80,443,8443. Moved the rule to the top of the rule set. Connected again to QUIC test web sites.

    Guess what happened? Appears Eset forum uses QUIC. In any case, QUIC UDP traffic is being detected by the firewall but I never see it showing up in TCPView.

  12. More testing last night. What a mess. But, a lot of progress.

    First is I found out why QUIC sites weren't processing in Firefox. Somehow there were two network.http.http3.enabled settings were present in about:config. The first instance was set to false and the second one set to true. Deleted the false instance and now the above posted QUIC test sites all show QUIC is enabled.

    Next, I disabled DoH in Firefox resulting in use of my ISP assigned DNS servers.

    I then proceeded to test and observe what was happening network-wise when I accessed the QUIC test sites. No UDP 80/443 connections whatsoever. But for IPv6 connections, the expected TCP 6rd tunnel connection to tunnel broker IP addresses being made.

    Bottom line - the QUIC UDP traffic is immediately being converted to IPv6 TCP 6rd tunnel traffic. Eset HTTP/3 scanning is interfering with the 6rd TCP tunneling processing resulting in the IPv6 existing 6rd tunnel configuration being borked. Since I have not encountered any issues to date with Eset processing the TCP 6rd tunnel network connections, I assume it can detect any malicious QUIC network traffic embedded within. Further proof of this was when access to https://crackingpatching.com ; discussed at length in two other forum threads, was tested. Eset blocked access as noted below. The point to note is the connection was made via IPv6 whereas in the past, connection was made via IPv4 when HTTP/3 was disable in Firefox;

    Quote

    Time;URL;Status;Detection;Application;User;IP address;Hash
    4/8/2024 1:54:15 PM;https://crackingpatching.com;Blocked;Internal blacklist;C:\Program Files\Mozilla Firefox\firefox.exe;xxxxxxxx;2606:4700:3030::ac43:db5f;27BB8D2FC02CD2BBC184D07357AAA9903D88B425

    As far as access to QUIC IPv4 web sites, I will just have to live with the risk. I believe that is minimal due to Windows preferring IPv6. What Eset needs to do is provide an option to only scan IPv4 QUIC traffic.

×
×
  • Create New...