6BFFD098-A112-3610-9833-46C3F87E345A
wkssvc.dll
(loads into)svchost.exe
- ncacn_np:
\PIPE\wkssvc
- T1087 - Account Discovery
- User Logon Enumeration
-
Network:
-
Inbound network connections to System over port 445
-
Methods:
NetrWkstaGetInfo
NetrWkstaUserEnum
-
Network connection to pipe
\pipe\wkssvc
-
-
Host:
- 5145 (Detailed Network File Share) Event to
- Share Name:
IPC$
- Relative Target -
\pipe\wkssvc
- Look at the user who made the connection
- Access Request Information: Access Mask (
0x3
or higher) (ReadData or ListDirectory + WriteData or AddFile
) - BH has been seen to have the hardcoded rights:
0x12019f
(READ_CONTROL, SYNCHRONIZE, ReadData (or ListDirectory), WriteData (or AddFile), AppendData (or AddSubdirectory or CreatePipeInstance), ReadEA, WriteEA , ReadAttributes, WriteAttributes
)
- Share Name:
- 5145 (Detailed Network File Share) Event to
-
Prevent relay attacks by enabling SMB signing:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters\RequireSecuritySignature = 1
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManWorkstation\Parameters\EnableSecuritySignature = 1
-
MSFT link for guidance: https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
-
RPC filter doesn't exist for this interface due to the unknowings of other technologies that could be leveraging MS-WKST.
-
Service Name: Lanman Workstation
-
Often seen with BH activity for user enumeration.
-
Look for connection to named pipe (both client and server)
-
Protocol was built to facilitate remote tasks on a host, such as:
- SMB network redirector configuration
- Manage domain memberships
- Return information related to user logins and enabled transports
-
In order to run successfully - requester must have administrator rights