a8e0653c-2744-4389-a61d-7373df8b2292
fssagent.dll
loads into svchost.exe
- ncacn_np:
\\pipe\FssagentRpc
-
Network:
- NTLM Authentication requests (zeek - ntlm.log)
-
RPC Methods:
- IsPathSupported
- IsPathShadowCopied
-
Host:
- Inbound connection over port 445 to
System
process (WSE - 5156 + Sysmon - 3) - Pipe connection
\FssagentRpc
fromSystem
process (Sysmon - 18) - fssagent.dll loaded into svchost.exe (Sysmon -7)
- LogonEvent
- LogonType:
3
- Elevated Token:
Yes
- Account Name:
- LogonProcess:
NtlmSsp
- Auth Package:
NTLM
- LogonType:
- Network Share Event:
- Account Name: (same logon id as logon event)
- Object Type: File
- Share Name
\\*\IPC$
- Relative Target Name:
FssagentRpc
- AccessMask:
0x3
- Accesses:
ReadData (or ListDirectory)
WriteData (or AddFile)
- Inbound connection over port 445 to
-
Turn off fssagent Service
-
Set fssagent Service Startup Type to Disabled
-
Certificate Mitigation: https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/07/microsoft-provides-more-mitigation-instructions-for-the-petitpotam-attack/
-
Disable NTLM Authentication
-
RPC Filters
rpc filter add rule layer=um actiontype=permit add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292 add condition field=auth_type matchtype=equal data=16 add condition field=auth_level matchtype=equal data=6 add filter add rule layer=um actiontype=block add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292 add filter quit
-
When set this will not relay NTLM auth.
-
Another option is to block the interface altogether or specify the domain group allowed to request this information:
rpc filter add rule layer=um actiontype=permit add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292 add condition field=remote_user_token matchtype=equal data=D:(A;;CC;;;DA) add filter add rule layer=um actiontype=block add condition field=if_uuid matchtype=equal data=a8e0653c-2744-4389-a61d-7373df8b2292 add filter quit
-
Credit to Lionel Gilles for introducing this attack and Charlie Bromberg for POC.