Jump to content

itman

Most Valued Members
  • Posts

    12,210
  • Joined

  • Last visited

  • Days Won

    321

Everything posted by itman

  1. There's a simply way to verify what directory epfwlwf.sys is loading from. Refer to the above registry screen shot. Find the entry for epfwlwf. Refer to the "ImagePath" entry. If it shows C:\Program Files\ESET\Eset Security\Drivers, then that is where the driver will be loaded from. Note that driver loading and use of it are two different things. I examined the Start Type setting value for my network adapter and it's "3', i.e. Load on Demand or manual. Obviously the network adapter has to be initialized prior to the assignment of Eset's NDIS mini-port filter to it. This is where ekrn.exe use might come into play. So it might be that there is a bug/issue here where possibly some residual registry entry or the like that ekrn.exe refers to, and it is set to C:\Program Files\ESET\ESET Smart Security\Drivers versus C:\Program Files\ESET\ESET Security\Drivers?
  2. The option has nothing to do with either. Both gpedit.msc or secpol.msc are Windows policy/security utilities only available on the Pro+ versions.
  3. I will also add that Sophos has a simple mitigation recommendation that will eliminate most RDP brute force password guessing attacks while at the same time not permanently locking out a user's workstation: https://nakedsecurity.sophos.com/2017/11/15/ransomware-spreading-hackers-sneak-in-through-rdp/
  4. Here's how we can verify that EpfwLWF.sys is properly loaded. Had to "comb the deep recesses of my brain" for Win 7 memories which I rather not remember.😅 Refer to the below screen shot in regards to your network adapter. Under the "This connection uses the following items" should be something titled "NDIS Eset Mini-port Filter" or some wording similar to that. If it exists, assume the driver has been loaded and is functioning properly and just ignore the Event Log entry. Additionally if the driver wasn't properly loaded, Eset's SSL/TLS protocol filtering processing wouldn't be functional.
  5. There's also possibly another dimension to this problem. @Marcos is not EpfwLWF.sys, Eset's network adapter mini-port filter driver that Eset stopped using releases ago in favor of Windows Filtering Platform use? In other words, the question is if this driver should be installed in the first place?
  6. This indicates to me that epfwlwf.sys is installed and not loading at boot time; but thereafter. I suspect that the associated reg. key "Start" value might be improperly set. Eset on Win 10 doesn't use this driver. So I have shown a screen shot of a like Eset driver associated service reg. key location and Start value setting. If epfwlwf service reg. key Start value is not set to "1", you can do so and see if that resolves the Event 7026 creation. Warning: Only do the above if the Type setting for the reg. key shows a value of "1".
  7. As far as the first three reasons given, it's a fair assumption. In prior endpoint attacks where logs or specific details were provided, RDP was always the attackers entry point into the network. Once in the network, he could easily access any device where Eset was installed. Even if password protected, it could be bypassed via keystroke capture using a keylogger or other credential capture means. Further, there has been at least one forum poster who was been repeatedly attacked via RDP despite being initially warned and advised on how to properly secure it. To set the record straight, the vast majority of ransomware incidents posted in the forum involved business networks. The individual user postings I have seen are from those seeking help or a decrypter and don't even have Eset installed. Or, they naively installed Eset after the ransomware incident in belief it could both remove the ransomware and decrypt their files.
  8. In the Eset GUI if an option selection is blank; i.e. uncheck-marked, it means that option is disabled.
  9. https://www.howtogeek.com/180477/htg-explains-how-do-spammers-get-your-email-address/
  10. Unless the OP replies back with specific details on the staging events of the attack, we will never know what they were. Unfortunately, most will never do so because disclosure of these events could very well cost them their employment.
  11. I assume any one who has posted to this effect is using the pre-released version.
  12. Actually it wasn't mentioned what account/s are used by the password specified in the e-mail. In regards to financial web sites as a rule, web sites of this nature don't use your e-mail address as logon id. They also usually require additional verification after logging on. For web sites where the logon id is your e-mail address and the password indicated in the e-mail is your password, I would change the password on those web sites. Also, I do hope the same password is not used on all the web sites you frequent.
  13. Also to clarify, I expect to see Eset alert displayed, entry created in Detection log showing AMSI detection, and script quarantined. Obviously since the script was never executed, PowerShell output display would not show what if given for the WD detection. Also rather going the AMTSO committee route, Eset could just create like test AMSI PowerShell malware .php script? Since it would only be detected by Eset, the "obsessive" FP concern would be eliminated.
  14. I just asked for a sig. to be added to verify Eset's AMSI detection functionality. No different in concept to existing AMTSO tests. Forget I asked.
  15. Wrong. Refer to the Microsoft article for output displayed from Powershell when detected.
  16. @Marcos, Eset AMSI doesn't detect this Powershell malware script; i.e. Win32/Mptest!amsi, that Microsoft developed to test AMSI functionality as noted below: Ref.: https://docs.microsoft.com/en-us/windows/win32/amsi/how-amsi-helps I assume and hope this is because Eset doesn't have a like sig. detection for this. Please add a sig. for this. Let me know when this is done so I can retest. Note: LiveGrid uploaded something when I was testing so the servers might already have code.
  17. Appears this Symantec utility will remove all traces of Norton on a Mac: https://support.norton.com/sp/en/us/home/current/solutions/kb20080427024142EN Likewise for whatever other AV traces you found, there should be a stand-alone uninstall/cleaner vendor utility for it. Here's an Eset knowledge base article on how to uninstall and reinstall Eset on a Mac: https://support.eset.com/kb3239/?locale=en_US&viewlocale=en_US
  18. You made a wise choice. Glad to have you on board.
  19. I checked the code signing specification on both the Microsoft ELAM and AMSI certificates used in both Eset corresponding entities and they are identical; i.e. 1.3.6.1.5.5.7.3.3. So at this point, I am at a loss as to why Win 10 1903 is blocking loading of the Eset AMSI .dll into PPL processes. What I do know is these code integrity errors for PPL processes were not occurring on Win 10 1809. I "religiously" check that event log for errors. I suggest Eset developers get together with Microsoft as to cause and resolution. -EDIT- One possibility is the Microsoft driver certificate Eset is using to sign its AMSI .dll must be EV status as the corresponding ELAM certificate is.
  20. Actually I misstated in use of Eset's ELAM cert. per se. Eset's needs to add the special PPL keys provided within the ELAM cert. to its existing driver authenticode cert..
  21. My take on this is this cert. can be used to sign .dlls. As you noted previously, Windows is attempting to load the AV amsi.dll into a PPL process. It wouldn't attempt it unless it assumed the .dll was properly signed. https://googleprojectzero.blogspot.com/2018/10/injecting-code-into-windows-protected.html Or alternatively, just use one of the PPL bypasses noted in the article.🙄
  22. OK. Let's assume eamsi.dll has been added to the list of knowndlls, etc.. In any case, it will not be loaded into any PPL process because it is not properly signed to do so. Since Microsoft is increasingly using PPL to protect its processes, Eset's monitoring capability is increasingly being diminished. As any pen-tester "worth his salt" will attest, PPL is somewhat of a joke and multiple bypass POCs exist showing this.
  23. Figured out why Eset attempts to inject its AMSI .dl into svchost.exe PPL instances is failing. Had to dive into my reference materials. To inject code into a PPL process, the code must be signed at WindowsTCB authentication level. This is the highest signing level available. Eset signed the eamsi.dll with its regular driver certificate which is authorized for PP - Authenticode level only. Microsoft only issues one type of WindowsTCB level certificate. That is the certificate Eset used to sign its ELAM driver. Therefore it appears to me, Eset needs to sign the eamsi.dll with this certificate:
  24. Also, beware of the type of attacker you are dealing with if you decide to pay the ransom: https://www.bleepingcomputer.com/forums/t/688649/phobos-ransomware-help-topic-phobos-phoboshta/?p=4823841
×
×
  • Create New...