Server Service Remote Protocol (MS-SRVS)
4b324fc8-1670-01d3-1278-5a47bf6ee188
srvsvc.dll
(loads into) svchost.exe
- ncacn_np:
\PIPE\srvsvc
- T1018 - Remote System Discovery
- System Enumeration
-
Network:
- Inbound network connections to System over port 445
- Network connection to pipe -
\pipe\srvsvc
- Methods:
NetSessionEnum
-
Host:
-
Window Security Event 5145 (Detailed Network File Share):
- Share Name:
IPC$
- Relative Target Name:
\pipe\srvsvc
- Look at the user who made the connection
- Access Request Information: Access Mask (0x3 or higher) (
ReadData or ListDirectory + WriteData or AddFile
)
Note:: BH has been seen to have the hardcoded rights:
0x12019f (READ_CONTROL, SYNCHRONIZE, ReadData (or ListDirectory), WriteData (or AddFile), AppendData (or AddSubdirectory or CreatePipeInstance), ReadEA, WriteEA , ReadAttributes, WriteAttributes)
- Share Name:
-
Ransomware has been known to shut off the Lanman Server Service
-
-
Prevent relay attacks by enabling SMB signing:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\RequireSecuritySignature = 1
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\EnableSecuritySignature = 1
-
MSFT link for guidance: https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
-
NetCease: Changes
HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/LanmanServer/DefaultSecurity/SrvsvcInfo
binary value -
RPC Filter Example:
rpc
filter
add rule layer=um actiontype=permit
add condition field=if_uuid matchtype=equal data=4b324fc8-1670-01d3-1278-5a47bf6ee188
add condition field=remote_user_token matchtype=equal data=D:(A;;CC;;;BA)
add filter
add rule layer=um actiontype=block
add condition field=if_uuid matchtype=equal data=4b324fc8-1670-01d3-1278-5a47bf6ee188
add filter
quit
- RPC filter to only allow Administrators
-
Adding
NT AUTHORITY\BATCH, NT AUTHORITY\INTERACTIVE, NT AUTHORITY\SERVICE
to filter might help with compatibility/functionality issues. -
Lanman Server
- System Enumeration:
- User Session Enumuration (
NetSessionEnum/NetrSessionEnum
) - Share Enumeration (
NetShareEnum/NetrShareEnum
) - Connection Enumeration (
NetConnectionEnum/NetrConnectionEnum
) - File Enumeration (
NetFileEnum/NetrFileEnum
)
- User Session Enumuration (
- System Enumeration:
-
Often seen with BH activity
-
Look for connection to named pipe (both client and server)