I'm running the Exchange server exploit checks recommended by Microsoft here: [MS Security Response Center - OnPremise Exchange Server Vulnerabilities Resource Center - updated March 16, 2021]2 Security Scripts
I installed the latest patches and then ran the Exploit checks EOMT.ps1
and Test-ProxyLogon.ps1
.
The Exchange log files scan for IOC came back with Suspicious activity found in Http Proxy log!
with AnchorMailbox stuff like this (actual servername replaced with THISSERVER for anonymity):
AnchorMailbox : ServerInfo~a]@THISSERVERAppS.THISSERVER.local:444/autodiscover/autodiscover.xml?#
AnchorMailbox : ServerInfo~a]@THISSERVERAPPS/autodiscover/autodiscover.xml#
AnchorMailbox : ServerInfo~localhost/owa/auth/logon.aspx?
AnchorMailbox : ServerInfo~8gmqsf.dnslog.cn/owa/auth/logon.aspx?
AnchorMailbox : ServerInfo~THISSERVERAPPS/EWS/Exchange.asmx?a=
AnchorMailbox : ServerInfo~THISSERVERAppS.THISSERVER.local/EWS/Exchange.asmx?a=
AnchorMailbox : ServerInfo~THISSERVERAPPS/autodiscover/autodiscover.xml?a=
AnchorMailbox : ServerInfo~Administrator@THISSERVERAPPS:444/mapi/emsmdb?MailboxId=f26bc937-b7b3-4402-b890-96c4671
AnchorMailbox : ServerInfo~Administrator@THISSERVERAPPS:444/ecp/proxyLogon.ecp?a=
AnchorMailbox : ServerInfo~Admin@THISSERVERAPPS:444/mapi/emsmdb?MailboxId=e21c6801-85e9-4f90-98ca-df928510591a@mo
AnchorMailbox : ServerInfo~Admin@THISSERVERAPPS:444/ecp/proxyLogon.ecp?a=
AnchorMailbox : ServerInfo~Admin@THISSERVERAPPS:444/ecp/about.aspx?a=
AnchorMailbox : ServerInfo~Admin@THISSERVERAPPS:444/ecp/DDI/DDIService.svc/GetObject?schema=OABVirtualDirectory&m
AnchorMailbox : ServerInfo~localhost/ecp/default.flt?
AnchorMailbox : ServerInfo~8gmqsf.dnslog.cn/ecp/default.flt?
AnchorMailbox : ServerInfo~somethingnonexistent/ecp/default.flt?
and dodgy looking UserAgent entries like Mozilla hehe
amongst others.
I can't see the URL Stems in the virtual directories reported by the scan:
/ecp/default.flt
/ecp/temp.js
/ecp/xxx.js
/ecp/s36y.js
/ecp/ssrf.js
/ecp/043l.js
/ecp/hk9o.js
/owa/auth/x.js
I'm running the latest MSERT (1.333.600.0) right now. Started about 35 mins ago and still only 25% done. It's found 1 infected file so far. I'm hoping it can clear things up. Not sure what else I can do at this stage?