Skip to content

Latest commit

 

History

History
92 lines (76 loc) · 3.14 KB

MS-FSRVP.md

File metadata and controls

92 lines (76 loc) · 3.14 KB

Protocol:

Interface UUID:

  • a8e0653c-2744-4389-a61d-7373df8b2292

Server Binary:

fssagent.dll loads into svchost.exe

Endpoint:

  • ncacn_np: \\pipe\FssagentRpc

ATT&CK Relation:

Indicator of Activity (IOA):

  • Network:

    • NTLM Authentication requests (zeek - ntlm.log)
  • RPC Methods:

    • IsPathSupported
    • IsPathShadowCopied
  • Host:

    • Inbound connection over port 445 to System process (WSE - 5156 + Sysmon - 3)
    • Pipe connection \FssagentRpc from System process (Sysmon - 18)
    • fssagent.dll loaded into svchost.exe (Sysmon -7)
    • LogonEvent
      • LogonType: 3
      • Elevated Token: Yes
      • Account Name:
      • LogonProcess: NtlmSsp
      • Auth Package: NTLM
    • Network Share Event:
      • Account Name: (same logon id as logon event)
      • Object Type: File
      • Share Name \\*\IPC$
      • Relative Target Name: FssagentRpc
      • AccessMask: 0x3
      • Accesses:
        • ReadData (or ListDirectory)
        • WriteData (or AddFile)

Prevention Opportunities:

  • Turn off fssagent Service

  • Set fssagent Service Startup Type to Disabled

  • Certificate Mitigation: https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/07/microsoft-provides-more-mitigation-instructions-for-the-petitpotam-attack/

  • Disable NTLM Authentication

  • RPC Filters

    rpc
    filter
    add rule layer=um actiontype=permit
    add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292
    add condition field=auth_type matchtype=equal data=16
    add condition field=auth_level matchtype=equal data=6
    add filter
    add rule layer=um actiontype=block
    add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292
    add filter
    quit
    
    • When set this will not relay NTLM auth.

    • Another option is to block the interface altogether or specify the domain group allowed to request this information:

      rpc
      filter
      add rule layer=um actiontype=permit
      add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292
      add condition field=remote_user_token matchtype=equal data=D:(A;;CC;;;DA)
      add filter
      add rule layer=um actiontype=block
      add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292
      add filter
      quit
      

Notes:

Useful Resources:

Credit to Lionel Gilles for introducing this attack and Charlie Bromberg for POC.