What We Do
How we do it
Resources
TRU INTELLIGENCE CENTER
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
SECURITY ADVISORIES
Mar 15, 2023
CVE-2023-23397 - Microsoft Outlook Elevation of Privilege Zero-Day Vulnerability
THE THREAT On March 14th, as part of Microsoft’s monthly Patch Tuesday release, the company disclosed a critical, actively exploited vulnerability impacting Microsoft Office and Outlook. The…
Read More
View all Advisories →
Company
ABOUT ESENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Mar 20, 2023
Exertis and eSentire Partner to Deliver 24/7 Multi-Signal MDR, Digital Forensics & IR Services and Exposure Management to Organisations Across the UK, Ireland, and Europe
Basingstoke, UK– 20 March, 2023. Leading technology distributor, Exertis, announced today that it has bolstered its cybersecurity services, adding eSentire, the Authority in Managed Detection and Response (MDR), to its Enterprise portfolio of offerings. eSentire’s award-winning, 24/7 multi-signal MDR, Digital Forensics & Incident Response (IR), and Exposure Management services will be available…
Read More
Partners
PARTNER PROGRAM
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
ECOSYSTEM PARTNER RESOURCES
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Security advisories — Feb 26, 2019

Kaseya Virtual System Administrator: New Updates

4 minutes read
Speak With A Security Expert Now

Originally published on 2018-01-29

eSentire has observed an unknown threat actor attempting to deploy a Monero cryptocurrency miner to multiple eSentire customers. We assess with high confidence that the threat leveraged Kaseya Ltd’s Virtual Systems Administrator (VSA) agent to gain unauthorized access to multiple customer assets since January 19, 2018.

Although we have no direct information pertaining to the root cause of the observed incidents, customers who utilize Kaseya VSA are encouraged to review the below action items and contact their managed service provider.

eSentire has disclosed this issue to Kaseya, who is actively working to communicate and mitigate the issue.

What we’re doing about it:

What you should do about it:

Kaseya has made a set of patches available to address this vulnerability and has provided procedures to detect and remove the Monero cryptocurrency miner software from affected endpoints. We recommend applying the vendor patches as soon as possible. Details are available from Kaseya at: https://helpdesk.kaseya.com/hc/en-gb/articles/360000333152

The technical Indicators of Compromise included in this advisory can be used by affected organizations to facilitate detection of the observed malicious activities. It is possible this exploit could mutate, requiring new Indicators of Compromise. eSentire will update this advisory as new information becomes available.

Additional information:

Between January 19th and 24th 2018, eSentire SOC observed suspicious PowerShell activity across several customers running esENDPOINT.

A summary of this activity is as follows:

The result of this activity is the deployment of Monero mining software xmrig.exe on victim assets. This activity was traced back to Kaseya’s VSA agent (agentmon.exe) and impacted customers were notified.

Customers who actively use Kaseya VSA are encouraged to examine systems for the indicators of compromise included in this advisory. Impacted systems can be remediated by removing registry keys and scheduled tasks, and by stopping the PowerShell process running xmrig.exe.

Indicators of Compromise:

Binary:

Domain:

Scheduled Tasks:

Two scheduled tasks are created using schtasks.exe, one with a randomly generated name with a static creation date, the other with a static task name.

IP Addresses (contacted by xmrig.exe):

149.56.23.158
104.223.89.251
104.144.207.217
138.128.5.66

Registry Keys

HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\a
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\b
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\c
HKLM\SOFTWARE\Microsoft\PowerShell\Scripts\d
HKLM\SOFTWARE\Microsoft\Powershell\Scripts\Scriptinit

URLs:

hxxps://dl[.]dropboxusercontent[.]com/s/vtzu1wyvem5n5je/reg_load.ps1
hxxps://dl[.]dropboxusercontent[.]com/s/namkbc37wtx2mdq/reg_load_subsequent.ps1
hxxps://dl[.]dropboxusercontent[.]com/s/nz6mq7jwnf8gmhq/first_script.txt
hxxps://dl[.]dropboxusercontent[.]com/s/4bilrgxthnl4iur/a_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/ounrhkotrpfkjrh/b_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/xuwfqqz8l8h88q2/c_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1iflfmz5ekeots1/d_32.txt
hxxps://dl[.]dropboxusercontent[.]com/s/yf63eyof45kqaku/a.txt
hxxps://dl[.]dropboxusercontent[.]com/s/x3nxssuzsra54ci/b.txt
hxxps://dl[.]dropboxusercontent[.]com/s/2hcowopx4qd1qph/c.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1b19mrmsyyu50y4/d.txt
hxxps://dl[.]dropboxusercontent[.]com/s/1up2snqmilrhq9b/Initialize%20Powershell%20Libraries.xml
hxxps://dl[.]dropboxusercontent[.]com/s/lywgcz9vukr5323/CacheTask.xml

UPDATE 2018-01-30

Yesterday evening, Dropbox hosted PowerShell scripts pertaining to this threat were updated with new registry keys and scheduled tasks.
This was noted by Huntress Labs (https://twitter.com/HuntressLabs/status/958262755638657024) and confirmed by eSentire.

We recommend following up with your MSP to ensure that the latest version of Kaseya’s cleanup scripts has been deployed (Kaseya has updated the script with checks for the new keys and scheduled task https://helpdesk.kaseya.com/hc/en-gb/articles/360000346651?mobile_site=true ).


Additional Details:

The first change is to the registry keys where the encoded binary parts and initiator script are stored:

Original:

 Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name a -Value $a
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name b -Value $b
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name c -Value $c
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell\Scripts -Name d -Value $d
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Powershell -Name ScriptInit -Value $firstScript


New (2018-01-29):

Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name a -Value $a
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name b -Value $b
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name c -Value $c
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies\System -Name d -Value $d
Set-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Policies -Name Start -Value $firstScript


The second change is an edit to scheduled task “\Microsoft\Windows\WindowsUpdate\sihboot”, which executes PowerShell and redeploys the initiator script and binary.

UPDATE 2018-02-14

eSentire has observed several changes in infrastructure and persistence techniques since 2018-01-30. The infrastructure used to host deployment scripts and binaries has moved away from Dropbox to various VPS hosts. eSentire has blocked access to the new infrastructure across our customers, but are not publicly sharing these indicators at this time.

Registry keys holding encoded xmrig binary parts and the initiator script has changed to the following locations:

HKLM:\SOFTWARE\Microsoft\Tcpip\x
HKLM:\SOFTWARE\Microsoft\Tcpip\d
HKLM:\SOFTWARE\Microsoft\Tcpip\c
HKLM:\SOFTWARE\Microsoft\Tcpip\b
HKLM:\SOFTWARE\Microsoft\Tcpip\a

Reg_load.ps1 uses Windows Task Scheduler (schtasks.exe) to read from file SynchronizeTimeZone.xml to deploy task name “\Microsoft\Windows\Time Zone\SynchronizeTimeZone”.

A new variant of xmrig.exe (compiled 2018-02-05) was also observed as md5:ed89e756ad2ed4bdb8b075e62ddf9fea/name:chrome.exe. This file was first submitted to VirusTotal at 2018-02-14 02:39:59.

Additionally, the following registry keys were observed after 2018-02-02, but may no longer be used:

HKLM:\SOFTWARE\Microsoft\RemovalTools\x
HKLM:\SOFTWARE\Microsoft\RemovalTools\d
HKLM:\SOFTWARE\Microsoft\RemovalTools\c
HKLM:\SOFTWARE\Microsoft\RemovalTools\b
HKLM:\SOFTWARE\Microsoft\RemovalTools\a

View Most Recent Blogs