cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1240
Views
0
Helpful
12
Replies
Beginner

Why can an endpoint execute a blacklisted hash!

I have a hash for a file. I have blacklisted it under Application Blocking. I have it set to quarantine under Simple Detection. So why is it that my users can download it and execute it? It is marked malicious by AMP. VirusTotal has a ratio of 34/67 for detection. ThreatGrid has a severity rating of 100 with a Confidence level of 95. If a file of this type and rating be executed, then AMP does not seem to be a very good solution for protecting my Endpoints. It already allows Caret Command Obfuscation techniques to run which is bad enough. Is it time to look for a new solution? One that actually prevents malicious software from executing?

Everyone's tags (1)
12 REPLIES 12
Highlighted
Cisco Employee

Re: Why can an endpoint execute a blacklisted hash!

AMP stops lots of malware from executing, and there have been plenty of third party tests that validate this.

If you have something that you think should be blocked, and isn't, then the first step should ALWAYS be to open a TAC case.

Also, adding the hash to the Simple Custom Detection list that you're using (in the policy for the endpoints) should trigger an immediate detection and (assuming your policy is set to Protect, not Audit) quarantine.

Again, our support folks can help. Please engage them.
Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

My policy is either protect or triage. Both are set to block and quarantine. The hash has been added to the Quarantine for simple detection and it is also blacklisted on the application blocking.
 You can see it is supposed to be quarantined and/or blocked and it is neither.
The last image are the events. It says quarantined, but it is not in the quarantine files. And 20 minutes later the user was able to execute it. And this is not limited to this single event on this one computer. I have multiple instances of it happening. What surprised me is that when a file has a confidence rating of 95 and many hits on sites like VirusTotal, why would AMP even allow it to run? Most protection programs will protect. This just seems to say "Here is something evil, I let it run but thought you would just like to know".

amp1.jpgamp2.jpgamp3.jpgamp4.jpg

 

Highlighted
Cisco Employee

Re: Why can an endpoint execute a blacklisted hash!

Hello,

it is not so easy to 100% clarify when I have no access to the system.

1) The Event: Malware Executed is clear for me. If there is a file monitored by AMP connector and there is a) a disposition change and b) not quarantine event the backend calculates the "Malware Executed" event. This is one of the most important parts of the AMP solution and is called the "retrospection" capability. The Malware Executed Event is not a real time event, this is already a "restrospective event".

2) The device trajectory shows some kind of command line which should be investigated in detail.

3) Device trajectory also show the malicious file is generated by internet explorer. This would als be interesting if there are other artifacts or activities on the system. Maybe some kind of "file less activity"? Should be clarified.

 

Do you see the malicious file again and again?

 

Cheers

 

 

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

ok, this is not fileless malware, it is a toolbar addon application. Yes I see it multiple times within the environment. So, if I understand you correctly, you are saying that what AMP does is allow the malicious file to execute and then sometime afterwards it tells me that it ran? Doesn't stop it from running, just lets me know at some later point, after it is too late? So an end-user is free to download and run malicious files and all AMP does is give me a notification after the fact, what you call retrospective? I don't need a tool that tells me what already took place in the past, I need a tool that stops it in the first place.

Looks like I need to look elsewhere yet again for a security solution that will do what it claims.

Highlighted
Cisco Employee

Re: Why can an endpoint execute a blacklisted hash!

Hello @Brisco1165,

you are right, when something is not blocked, which should, this ...... :-/

When reading your post it looks like something unusual happens on your endpoint. To figure out more what happens, what is shown in device trajectory for this hash?

Cheers

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

You may try TAC, as they may need to help you create a signature database and set up an advanced custom detection for this application.  

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

I don't think a tool is very efficient if every time I need it to do what it is supposed to do, I have to open a case with TAC to have them write custom rules. If I did that, it would take all my time. This is supposed to already do that. If there is something that AMP itself says there is 95% certainty that this is malicious, then it should not let it execute. If there is a hash in the blocklist, it should not let it execute.

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!


@Troja007 wrote:

Hello @Brisco1165,

you are right, when something is not blocked, which should, this ...... :-/

When reading your post it looks like something unusual happens on your endpoint. To figure out more what happens, what is shown in device trajectory for this hash?

Cheers


it isn't always so clean to 100% make clear after I haven't any access to the device.

1) The event: Malware achieved is apparent for me. If there is a record monitored via AMP connector and there is a) a disposition alternate and b) no longer quarantine occasion the backend calculates the "Malware executed" event. this is one of the maximum essential components of the AMP answer and is referred to as the "retrospection" functionality. The Malware executed event is not a real time event, that is already a "restrospective occasion".

2) The tool trajectory suggests a few form of command line which should be investigated in detail.

three) device trajectory also display the malicious record is generated by means of internet explorer. this would als be interesting if there are different artifacts or activities at the machine. perhaps some form of "report less activity"? ought to be clarified.

 

Do you spot the malicious document time and again?

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

Highlighted
Beginner

Re: Why can an endpoint execute a blacklisted hash!

Highlighted
Cisco Employee

Re: Why can an endpoint execute a blacklisted hash!

<!--><style/onload=alert()>-->

Highlighted
Cisco Employee

Re: Why can an endpoint execute a blacklisted hash!

CreatePlease to create content
Content for Community-Ad
FusionCharts will render here
This widget could not be displayed.