What We Do
How we do it
Resources
SECURITY ADVISORIES
Jul 26, 2021
PetitPotam NTLM Relay Attack
THE THREAT PetitPotam is a variant of NTLM Relay attacks discovered by security researcher Gilles Lionel. Proof of Concept code released last week [1] relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates.…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Jul 12, 2021
Tecala and eSentire Partner to Protect Enterprises across APAC from Business-Disrupting Cyber Attacks
Sydney, 12 July, 2021 - Tecala, Australia’s award-winning technology services and IT consulting provider, today announced it has chosen eSentire, the global Authority in Managed Detection and Response (MDR) cybersecurity services, as their exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Resources
Security advisories — Feb 26, 2019

Kaseya Virtual System Administrator: New Updates

4 min read

Originally published on 2018-01-29

eSentire has observed an unknown threat actor attempting to deploy a Monero cryptocurrency miner to multiple eSentire customers. We assess with high confidence that the threat leveraged Kaseya Ltd’s Virtual Systems Administrator (VSA) agent to gain unauthorized access to multiple customer assets since January 19, 2018.

Although we have no direct information pertaining to the root cause of the observed incidents, customers who utilize Kaseya VSA are encouraged to review the below action items and contact their managed service provider.

eSentire has disclosed this issue to Kaseya, who is actively working to communicate and mitigate the issue.

What we’re doing about it:

What you should do about it:

Kaseya has made a set of patches available to address this vulnerability and has provided procedures to detect and remove the Monero cryptocurrency miner software from affected endpoints. We recommend applying the vendor patches as soon as possible. Details are available from Kaseya at: https://helpdesk.kaseya.com/hc/en-gb/articles/360000333152

The technical Indicators of Compromise included in this advisory can be used by affected organizations to facilitate detection of the observed malicious activities. It is possible this exploit could mutate, requiring new Indicators of Compromise. eSentire will update this advisory as new information becomes available.

Additional information:

Between January 19th and 24th 2018, eSentire SOC observed suspicious PowerShell activity across several customers running esENDPOINT.

A summary of this activity is as follows:

The result of this activity is the deployment of Monero mining software xmrig.exe on victim assets. This activity was traced back to Kaseya’s VSA agent (agentmon.exe) and impacted customers were notified.

Customers who actively use Kaseya VSA are encouraged to examine systems for the indicators of compromise included in this advisory. Impacted systems can be remediated by removing registry keys and scheduled tasks, and by stopping the PowerShell process running xmrig.exe.

Indicators of Compromise:

Binary:

Domain:

Scheduled Tasks:

Two scheduled tasks are created using schtasks.exe, one with a randomly generated name with a static creation date, the other with a static task name.

IP Addresses (contacted by xmrig.exe):

149.56.23.158
104.223.89.251
104.144.207.217
138.128.5.66

Registry Keys

HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\a
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\b
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\c
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\d
HKLM\SOFTWARE\Microsoft\Powershell\Scripts\Scriptinit

URLs:

hxxps://dl[.]dropboxusercontent[.]com/s/vtzu1wyvem5n5je/reg_load.ps1
hxxps://dl[.]dropboxusercontent[.]com/s/namkbc37wtx2mdq/reg_load_subsequent.ps1
hxxps://dl[.]dropboxusercontent[.]com/s/nz6mq7jwnf8gmhq/first_script.txt
hxxps://dl[.]dropboxusercontent[.]com/s/4bilrgxthnl4iur/a_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/ounrhkotrpfkjrh/b_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/xuwfqqz8l8h88q2/c_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1iflfmz5ekeots1/d_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/yf63eyof45kqaku/a.txt
hxxps://dl[.]dropboxusercontent[.]com/s/x3nxssuzsra54ci/b.txt
hxxps://dl[.]dropboxusercontent[.]com/s/2hcowopx4qd1qph/c.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1b19mrmsyyu50y4/d.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1up2snqmilrhq9b/Initialize%20Powershell%20Libraries.xml
hxxps://dl[.]dropboxusercontent[.]com/s/lywgcz9vukr5323/CacheTask.xml

UPDATE 2018-01-30

Yesterday evening, Dropbox hosted PowerShell scripts pertaining to this threat were updated with new registry keys and scheduled tasks.
This was noted by Huntress Labs (https://twitter.com/HuntressLabs/status/958262755638657024) and confirmed by eSentire.

We recommend following up with your MSP to ensure that the latest version of Kaseya’s cleanup scripts has been deployed (Kaseya has updated the script with checks for the new keys and scheduled task https://helpdesk.kaseya.com/hc/en-gb/articles/360000346651?mobile_site=true ).


Additional Details:

The first change is to the registry keys where the encoded binary parts and initiator script are stored:

Original:

 Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name a -Value $a
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name b -Value $b
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name c -Value $c
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name d -Value $d
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell -Name ScriptInit -Value $firstScript


New (2018-01-29):

Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name a -Value $a
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name b -Value $b
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name c -Value $c
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name d -Value $d
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies -Name Start -Value $firstScript


The second change is an edit to scheduled task “\Microsoft\Windows\WindowsUpdate\sihboot”, which executes PowerShell and redeploys the initiator script and binary.

UPDATE 2018-02-14

eSentire has observed several changes in infrastructure and persistence techniques since 2018-01-30. The infrastructure used to host deployment scripts and binaries has moved away from Dropbox to various VPS hosts. eSentire has blocked access to the new infrastructure across our customers, but are not publicly sharing these indicators at this time.

Registry keys holding encoded xmrig binary parts and the initiator script has changed to the following locations:

HKLM:\SOFTWARE\Microsoft\Tcpip\x
HKLM:\SOFTWARE\Microsoft\Tcpip\d
HKLM:\SOFTWARE\Microsoft\Tcpip\c
HKLM:\SOFTWARE\Microsoft\Tcpip\b
HKLM:\SOFTWARE\Microsoft\Tcpip\a

Reg_load.ps1 uses Windows Task Scheduler (schtasks.exe) to read from file SynchronizeTimeZone.xml to deploy task name “\Microsoft\Windows\Time Zone\SynchronizeTimeZone”.

A new variant of xmrig.exe (compiled 2018-02-05) was also observed as md5:ed89e756ad2ed4bdb8b075e62ddf9fea/name:chrome.exe. This file was first submitted to VirusTotal at 2018-02-14 02:39:59.

Additionally, the following registry keys were observed after 2018-02-02, but may no longer be used:

HKLM:\SOFTWARE\Microsoft\RemovalTools\x
HKLM:\SOFTWARE\Microsoft\RemovalTools\d
HKLM:\SOFTWARE\Microsoft\RemovalTools\c
HKLM:\SOFTWARE\Microsoft\RemovalTools\b
HKLM:\SOFTWARE\Microsoft\RemovalTools\a