<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: W32.MAP.Ransomware.rwd. in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/4464733#M6384</link>
    <description>&lt;P&gt;Hello Paladin,&lt;/P&gt;
&lt;P&gt;bug&amp;nbsp;CSCvq59864 was fixed and shouldn't affect any 7.x or later Secure Endpoint connectors. Regarding detection that you see, it is related to MAP engine (Malicious Activity Protection) rule “rwd”: reading, writing and deleting a set of files within short span of time. That happens with some softwares, especially during update. If you are certain that is legitimate software you can always create exclusion of following type: Process &amp;gt; Malicious Activity (for MAP engine) by using either Path of SHA.&lt;/P&gt;
&lt;P&gt;Hope that help&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
    <pubDate>Mon, 13 Sep 2021 07:47:56 GMT</pubDate>
    <dc:creator>Wojciech Cecot</dc:creator>
    <dc:date>2021-09-13T07:47:56Z</dc:date>
    <item>
      <title>W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/4459425#M6369</link>
      <description>&lt;P&gt;Sha 256&amp;nbsp;e5dccb33478bf13629d0a3f0ba7daceb56d7792e0132886ed129334ec6bb2a33 detected by MAP and convicted as&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="detect_name"&gt;W32.MAP.Ransomware.rwd.&amp;nbsp; Found this post &lt;A href="https://quickview.cloudapps.cisco.com/quickview/bug/CSCvq59864," target="_blank" rel="noopener"&gt;https://quickview.cloudapps.cisco.com/quickview/bug/CSCvq59864,&lt;/A&gt;&amp;nbsp;my Connector version is 7.4.1.20439. Not a known affected version. False positive?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="heading"&gt;&lt;DIV class="details-heading"&gt;&lt;DIV class="details-container"&gt;&lt;DIV class="header"&gt;Event Details&lt;/DIV&gt;&lt;DIV class="close"&gt;&lt;DIV class="event-header"&gt;Medium&lt;DIV class="event-date"&gt;&lt;SPAN class="date"&gt;2021-09-03&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="time"&gt;12:40:43&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="zone"&gt;UTC&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;MAP detected&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="detect_fname bad long_words"&gt;d8e57517-45af-4d42-a2f1-7844fb9956ae.exe&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="long_words"&gt;Sontheim Components-1.07.6504-12 - #12 Full 12.0.21175.732&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(e5dccb33…c6bb2a33) as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="detect_name"&gt;W32.MAP.Ransomware.rwd.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="detect_fname  long_words"&gt;AGCOUpdateService.exe&lt;/SPAN&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="long_words"&gt;AGCOUpdateService for .NET 4.6.2 1.21.7684.29091&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(87eb220c…22037f3b)[Unknown] executing as SYSTEM@NT AUTHORITY.&lt;/P&gt;&lt;P&gt;The file was&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="not_quarantined"&gt;not quarantined.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_small"&gt;Error: Cannot delete file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Affected Files Count: 5&lt;/P&gt;&lt;P&gt;Affected Files:&lt;/P&gt;&lt;P&gt;C:\Windows\Temp\d5ed4260-0cb4-11ec-4823-4bb689ee0029\deltapackage\1\9&lt;/P&gt;&lt;P&gt;C:\Windows\Temp\d5ed4260-0cb4-11ec-4823-4bb689ee0029\deltapackage\1\10&lt;/P&gt;&lt;P&gt;C:\Windows\Temp\d5ed4260-0cb4-11ec-4823-4bb689ee0029\deltapackage\1\12&lt;/P&gt;&lt;P&gt;C:\Windows\Temp\d5ed4260-0cb4-11ec-4823-4bb689ee0029\deltapackage\1\11&lt;/P&gt;&lt;P&gt;C:\Windows\Temp\d5ed4260-0cb4-11ec-4823-4bb689ee0029\deltapackage\1\13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;File full path:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum long_words"&gt;C:\ProgramData\AGCO Corporation\AGCO Update\d8e57517-45af-4d42-a2f1-7844fb9956ae.exe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;File SHA-1:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;ae4ddbe24fb08d39791918d2a0ca8c94ab5de8f0&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;File MD5:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;075e4668ceca61859906d5288fbfd702&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;File size:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;183808096 bytes&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;File signed by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;AGCO Corporation&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with certificate serial 2 from thawte SHA256 Code Signing CA. Expires NaN:NaN:NaN, NaN 0NaN UTC. the certificate was&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;warn trusted&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Parent file SHA-1:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;efff229cbfa81dd4d4f35f5adaae0bbd100667f0&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent file MD5:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;4ecbfbc987d8072846c6115b028dc471&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent file size:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;1938344 bytes&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent file age:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;0 seconds&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent file signed by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;AGCO Corporation&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with certificate serial 2 from thawte SHA256 Code Signing CA. Expires NaN:NaN:NaN, NaN 0NaN UTC. the certificate was&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;warn trusted&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Parent file cert MD5:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;b1bcf6b5b1954a4dd1cb0de00cfbe3ba&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent file cert SHA-1:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="det_smaller datum"&gt;159bf94e915ba45752d31b62979a3acf93bea108&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;Parent process id:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;5340.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Parent process SID:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="datum"&gt;&lt;SPAN class="det_smaller"&gt;S-1-5-18&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Local System)&lt;/SPAN&gt;.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="content"&gt;&lt;DIV class="events"&gt;&lt;DIV class="event-row"&gt;&lt;DIV class="contents"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="event-row"&gt;&lt;DIV class="contents"&gt;&lt;DIV class="artifact target"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 03 Sep 2021 13:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/4459425#M6369</guid>
      <dc:creator>Paladin</dc:creator>
      <dc:date>2021-09-03T13:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/4464733#M6384</link>
      <description>&lt;P&gt;Hello Paladin,&lt;/P&gt;
&lt;P&gt;bug&amp;nbsp;CSCvq59864 was fixed and shouldn't affect any 7.x or later Secure Endpoint connectors. Regarding detection that you see, it is related to MAP engine (Malicious Activity Protection) rule “rwd”: reading, writing and deleting a set of files within short span of time. That happens with some softwares, especially during update. If you are certain that is legitimate software you can always create exclusion of following type: Process &amp;gt; Malicious Activity (for MAP engine) by using either Path of SHA.&lt;/P&gt;
&lt;P&gt;Hope that help&lt;/P&gt;
&lt;P&gt;Wojciech&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 07:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/4464733#M6384</guid>
      <dc:creator>Wojciech Cecot</dc:creator>
      <dc:date>2021-09-13T07:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292244#M8848</link>
      <description>&lt;P&gt;I have secure endpoint &amp;gt; 7.x but still having this issue.&lt;/P&gt;
&lt;P&gt;Can you clarify how I set the exclusion ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;Cisco Secure Client 5.1.7.1336&amp;nbsp;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;(Tue May 20 12:13:17 2025)&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Secure Endpoint 8.2.3.30119&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 20 May 2025 11:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292244#M8848</guid>
      <dc:creator>tiaandra</dc:creator>
      <dc:date>2025-05-20T11:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292291#M8849</link>
      <description>&lt;P&gt;This is over 4yrs old threat about specific FP event. When you saying that you have the same issue what exactly you referring to?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Lastly if you need to apply sets of exclusions you need to have access to the Secure Endpoint Dashboard and be the administrator in that ORG.&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 13:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292291#M8849</guid>
      <dc:creator>Roman Valenta</dc:creator>
      <dc:date>2025-05-20T13:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292372#M8850</link>
      <description>&lt;P&gt;hi, I'm getting this error after I install&amp;nbsp;&lt;A href="https://www.getpaint.net/" target="_blank"&gt;Paint.NET - Free Software for Digital Photo Editing&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not an admin so I guess I'm stuck &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; ?! do you know how I can request an exception to this ?&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 17:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292372#M8850</guid>
      <dc:creator>tiaandra</dc:creator>
      <dc:date>2025-05-20T17:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: W32.MAP.Ransomware.rwd.</title>
      <link>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292384#M8851</link>
      <description>&lt;P&gt;For exceptions withing your organization, you'll have to reach out to one of your organization admins so they can determine the risk and add an exception if appropriate. That isn't something we can do for you.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 17:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/w32-map-ransomware-rwd/m-p/5292384#M8851</guid>
      <dc:creator>Matthew Franks</dc:creator>
      <dc:date>2025-05-20T17:45:23Z</dc:date>
    </item>
  </channel>
</rss>

