Crowdstrike detection of malicious activity of Amazon SSM Agent for Windows

0

I think a more secure SSM Agent for Windows needs to be developed. Is there anything along these lines in the works?

I installed the valid, digitally signed AmazonSSMAgentSetup on a Windows server in preparation to present AWS as a potential alternative to our current on-prem logging solution. When opening up the Event Logs, Processes, or Performance info for this node in Fleet Manager, I get a Crowdstrike detection on the SessionManagerShell (winpty-agent.exe). This component of the SSM agent is unsigned and it is performing actions which are not acceptable in a secure Windows environment. This process downloads and executes a compressed, base64-encoded payload instead of using proper, code-signed powershell script. It collects the log files successfully at first, but it also puts powershell into bypass and runs a series of "wevtutil cl" commands that clear various Windows Event, Powershell, and trace logs which I prefer to retain. It's barbaric. At that point, Crowdstrike (rightfully) blocks the process and it does not continue to function.

已提問 2 年前檢視次數 220 次
1 個回答
1
已接受的答案

I recommend submitting the concern through the security vulnerability reporting form. Please see the Vulnerability Reporting page for more details.

AWS
Taka_M
已回答 2 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南