04-09-2024 05:45 AM
We have an end user machine that was placed into isolation after a high severity Cloud IOC Event (Cloud IOC: W32.PowershellIEXReplace.ioc) and a low severity Cloud IOC Event (Cloud IOC: W32.PowershellObfuscationAttempt.ioc) was detected. Powershell called cmd.exe and attempted to download sh.jpg from a URL. Once this happened, I received over 400 Exploit Prevention events for RegSvcs.exe for process hollowing attempts.
I want to be sure the exploit prevention events aren't false positives.
04-09-2024 07:34 AM
Seem like legitimate attack but not enough information to be 100% positive. If you like to investigate this incident more deeper you can always open TAC case and let us look in to that with you. Also as reminder. Most IOCs are generated by the AMP Console and are known as Synthetic events. They are merely notifications. The IOCs simply look for files or behaviors that match specific patterns and alert on them, sometimes whether it is benign or not. IOC’s will not BLOCK or QUARANTINE they will only inform you about something that you as administrator should investigate. Typically, these events do not always mean your endpoint has something malicious on it or block a file, it is more of an alert that you should investigate further. Automated action (isolation) however still apply.
04-09-2024 08:02 AM
Thank you Roman, I understand the roles of IOCs and appreciate your feedback. I opened a tac case to help investigate this further.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide