Jump to content

I keep getting warnings. "IP address blocked."


Go to solution Solved by Marcos,

Recommended Posts

Hello;

I have been receiving constant warnings since this morning. "IP address blocked." I closed all applications, scanned the computer. I restarted the computer. But nothing changed. ESET continues to give warnings.

What is the source of the problem? How can I solve it?
Turning off alerts is not a solution. I don't want that.

Ekran görüntüsü 2024-08-08 110029.png

Link to comment
Share on other sites

This is a strange one. The shown IP address is not routable; i.e. won't resolve.

Edited by itman
Link to comment
Share on other sites

27 minutes ago, Addwork said:

I am scanning but there doesn't seem to be any problems.

As long as you're not receiving any further Eset detection popups related to the IP address, the problem is resolved.

Link to comment
Share on other sites

6 minutes ago, itman said:

As long as you're not receiving any further Eset detection popups related to the IP address, the problem is resolved.

Unfortunately. I'm still getting the warning. Nothing has changed.

Link to comment
Share on other sites

1 minute ago, Marcos said:

Could you restart the computer and see if the file is detected?

If this persists, it's possible legit Win Task Manger has been replaced with this rogue one. Possibilities include reg. debugger value, etc..

Link to comment
Share on other sites

20 minutes ago, Marcos said:

Could you restart the computer and see if the file is detected?

I restarted the computer. No change. I keep getting the warning.

Link to comment
Share on other sites

I just ran an online scan and it found some things. I'll restart the computer and see what happens.

Why can't the ESET software installed on my computer find these viruses?

Ekran görüntüsü 2024-08-08 183909.png

Link to comment
Share on other sites

I restarted my computer. The problem seems to be solved. Why couldn't the ESET application fix the problem? Did I pay for this for nothing?

Ekran görüntüsü 2024-08-08 184504.png

Link to comment
Share on other sites

  • Administrators
  • Solution

The other detections are potentially unsafe applications which are disabled by default and they were turned off also in your config:

image.png

However, this does not explain why the trojan was not detected. It was not registered in run keys for autostart. When testing cleaning on my machine, it was detected in memory and cleaned.

image.png

image.png

 

Link to comment
Share on other sites

2 hours ago, Marcos said:

However, this does not explain why the trojan was not detected. It was not registered in run keys for autostart. When testing cleaning on my machine, it was detected in memory and cleaned.

Wondered the same thing.

Of interest is OP's online scan log shows a restart was required to remove the rogue task manager. This would imply the .exe was locked from access by Windows.

Your screen shot shows rogue task manager running as a child process of explorer.exe. As such, access to it would not be an issue. Assume some other privileged Win process has started the rogue task manager.

Edited by itman
Link to comment
Share on other sites

4 hours ago, Marcos said:

It was not registered in run keys for autostart.

Reviewing a similar detection by Microsoft: https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=TrojanProxy:Win32/Agent.E yields:

Quote
The registry is modified to execute this dropped component at each Windows start.
 
Adds value: {DA1DE019-A6A8-ED40-4B87-248B2A93DE99}
To subkey: HKLM\SOFTWARE\Classes\CLSID\
 
Adds value: "(default)"
With data: "%windir%\sysocmgr.dll"
To subkey: HKLM\SOFTWARE\Classes\CLSID\{DA1DE019-A6A8-ED40-4B87-248B2A93DE99}\InprocServer32
 
The dropped file is executed using the Windows system tool RUNDLL32.EXE and it drops another DLL component as the following:
 
<system folder>\mshta.dll

This also appears to be a DNS poisoning attack. As such, makes me wonder why Eset removed DNS poisoning from IDS protection?

Link to comment
Share on other sites

  • Administrators
6 minutes ago, ES_ET_Novice said:

What is the Solution?

ESET Online Scanner only?

Is the file undetected by ESET if you scan it? Is it detected when scanned with the command-line scanner "C:\Program Files\ESET\ESET Security\ecls.exe" ?

Link to comment
Share on other sites

Yes undetected by ESET Endpoint Antivirus, installed 1h ago ESET Online Scanner is running right now and it found some file, then ESET Endpoint Antivirus show popup: "detection 'through' ESET Online Scanner, [...] restart to finish," i'll wait for Online Scanner to finish, then restart.

 

Got these 2 Detections in ESET Endpoint Antivirus:

Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
09.08.2024 08:53:52;Real-time file system protection;file;C:\Users\USER1~1.BEK\AppData\Local\Temp\nod485F.tmp;Win32/TrojanProxy.Agent.OEY trojan;cleaned by deleting (after the next restart);COMP1\USER1;Event occurred during an attempt to access the file by the application: C:\Windows\System32\Taskmgr.exe (05587415685CDADA02E09AF1394CE61A303D759F).;B2C8FEE980C9E337F8319E703F6835DB267BA10D;09.08.2024 08:45:22
 

Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
09.08.2024 08:50:23;Real-time file system protection;file;C:\Users\USER1\AppData\Local\Temp\nod485F.tmp;Win32/TrojanProxy.Agent.OEY trojan;cleaned by deleting (after the next restart);COMP1\USER1;Event occurred during an attempt to access the file by the application: C:\Users\USER1\AppData\Local\ESET\ESETOnlineScanner\ESETOnlineScanner.exe (12F009F222DBA1A57AE2D32BC031CE95C00D6827).;B2C8FEE980C9E337F8319E703F6835DB267BA10D;09.08.2024 08:45:22
 

Link to comment
Share on other sites

Just now, Marcos said:

So the file is undetected by ESET if you upload it to https://www.virustotal.com?

I mean i did yesterday a Full Scan with ESET Endpoint Antivirus and it didnt find it.

Online Scanner found it, and 1min later throught this Endpoint Antivirus also got the Message.

Then it finished and i just pressed Restart, so i guess i cant upload it anymore 😕 ?

Link to comment
Share on other sites

6 hours ago, ES_ET_Novice said:

Got these 2 Detections in ESET Endpoint Antivirus:

Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
09.08.2024 08:53:52;Real-time file system protection;file;C:\Users\USER1~1.BEK\AppData\Local\Temp\nod485F.tmp;Win32/TrojanProxy.Agent.OEY trojan;cleaned by deleting (after the next restart);COMP1\USER1;Event occurred during an attempt to access the file by the application: C:\Windows\System32\Taskmgr.exe (05587415685CDADA02E09AF1394CE61A303D759F).;B2C8FEE980C9E337F8319E703F6835DB267BA10D;09.08.2024 08:45:22

This is the same malware and Eset log entry gives more detail how it is being executed.

In this instance, the rouge task manager was created in multiple C:\Users directories as AppData\Local\Temp\nod485F.tmp and run at system startup time as a scheduled task The question is if something else running at system startup time and copying C:\Users\XXXXX\AppData\Local\Packages\Task Manager.exe, the rouge task manager malware, into AppData\Local\Temp\nod485F.tmp also at system startup time. Also, the rouge task manager malware might not be located at C:\Users\XXXXX\AppData\Local\Packages\Task Manager.exe.

Link to comment
Share on other sites

Reflecting on above .tmp file detection, it appears it was created by Eset online scanner for detection purposes. Subsequently, the .tmp file got detected by Eset real-time scanning when the on-demand EAS scan ran.

Since, the OP's EAS on-demand scan yesterday didn't detect the rouge task manager, there might be multiple variants of it be deployed. Some of these variants being able to avoid being detected by Eset real-time/on-demand scanning.

Edited by itman
Link to comment
Share on other sites

For what is is worth, Hybrid-Analysis has detailed analysis of this malware for both Win 10 and 11 here: https://www.hybrid-analysis.com/search?query=B2C8FEE980C9E337F8319E703F6835DB267BA10D . Unfortunately, I couldn't find any details from those reports on how this bugger is being run at system startup time and evade real-time detection.

-EDIT- Reanalyzing the VirusTotal details on this malware, appears it's being installed via a fake/hacked Google update; I am assuming Chrome here. Persistence is had by creation of a service to run the update at system startup time.

Also, there appears to be a WMI factor involved; either creation of a consumer or command event.

Edited by itman
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...