cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted

Exploit Prevention

Jump to solution

How to block below from ENS. Not able to find below rule

 

07/03/2018 23:07:34    mfetp(12560.14136) <SYSTEM> TmpLogger.BoBl.Activity: Content update request received. Verifying the content package (C:\ProgramData\McAfee\Agent\Current\ENDPCNT_1000\DAT\0000\EXP_20180206_08231_ENDP_AM_1000.zip).
07/03/2018 23:07:39    mfetp(12560.14136) <SYSTEM> TmpLogger.BoBl.Activity: Content package verified, applying update...
07/03/2018 23:08:32    mfetp(12560.14136) <SYSTEM> TmpLogger.BoBl.Activity: Content update succeeded. Exploit Prevention content version: 10.5.0.8231
08/03/2018 07:06:45    mfetp(12560.9488) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.
08/03/2018 07:06:45    mfetp(12560.9488) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.
08/03/2018 15:40:50    mfetp(12560.9488) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.
08/03/2018 15:40:50    mfetp(12560.9488) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.
08/03/2018 15:42:05    mfetp(12560.9488) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Heap Blocked an attempt to exploit C:\WINDOWS\SYSWOW64\MSIEXEC.EXE, which targeted the VirtualProtect API.
08/03/2018 18:01:22    mfetp(6364.10440) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.
08/03/2018 18:01:22    mfetp(6364.10440) <SYSTEM> TmpLogger.Gbop.Activity: ExP:Illegal API Use was detected as an attempt to exploit C:\WINDOWS\SYSWOW64\WINDOWSPOWERSHELL\V1.0\POWERSHELL.EXE, which targeted the AtlComPtrAssign API. It wasn't blocked because Exploit Prevention was set to Report Only.

1 Solution

Accepted Solutions
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 6 of 6

Re: Exploit Prevention

Jump to solution

Hello,

Recently I had the same issue and this is what I found out:

1. By default this Exploit Prevention rule ID 6073 is disabled.

2. It indicates the following vulnerability:image.png

3. The execution policy bypass is associated with some types of malware activity so it could be an indication of exploit. You can find additional details about Execution policy details here:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy...

4. The API reported is this one:
https://msdn.microsoft.com/en-us/library/40d27a83.aspx

5. In case the alarm still pops up on this or multiple systems, you can perform deeper investigation and collect samples from that machine to check for ongoing malware activity.

In case above information was useful or answered your question, please select "Accept as Solution" in my reply, or give a Kudo. Thanks!
Nino

View solution in original post

Tags (1)
5 Replies
Highlighted

Re: Exploit Prevention

Jump to solution
What is the AtlComPtrAssign API? I am getting the same events.
Highlighted
Level 7
Report Inappropriate Content
Message 3 of 6

Re: Exploit Prevention

Jump to solution

Same here.  Getting this multiple times per day from different computers.  I am hesitant to permit it especially with a category of host intrusion buffer overflow.  Only on Win 10 so far.

Highlighted
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 4 of 6

Re: Exploit Prevention

Jump to solution

i am assuming this is firing on the Generic Buffer Overflow Protection rule.
Gbop = Generic Buffer Overflow Protection 

Powershell being a defined protected process.

is the Generic Buffer Overflow Protection rule set to report only in the assigned EP policy?

 

Highlighted
Level 7
Report Inappropriate Content
Message 5 of 6

Re: Exploit Prevention

Jump to solution

6070 - Hidden Powershell Detected rule is firing.  Block and Report.

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 6 of 6

Re: Exploit Prevention

Jump to solution

Hello,

Recently I had the same issue and this is what I found out:

1. By default this Exploit Prevention rule ID 6073 is disabled.

2. It indicates the following vulnerability:image.png

3. The execution policy bypass is associated with some types of malware activity so it could be an indication of exploit. You can find additional details about Execution policy details here:
https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy...

4. The API reported is this one:
https://msdn.microsoft.com/en-us/library/40d27a83.aspx

5. In case the alarm still pops up on this or multiple systems, you can perform deeper investigation and collect samples from that machine to check for ongoing malware activity.

In case above information was useful or answered your question, please select "Accept as Solution" in my reply, or give a Kudo. Thanks!
Nino

View solution in original post

Tags (1)
You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community