MX Malware Blocking

AVIF
Here to help

MX Malware Blocking

Is anyone else seeing large amount of Malware blocking on their MX?

W32.975C0D48C4.RET.SBX.TG

ArchiveFile

Is this a false positive related to Microsoft ?

 

43 Replies 43
jcgvt
Here to help

I am seeing it too.  I believe it is a false positive - but not my call of course. 

NJNetworkGuy100
Getting noticed

We are getting a ton of these alerts as well.  

Jameson
Getting noticed

I just attempted to post about this and Meraki marked it SPAM. We are seeing thousands of these notification (over 9000 at time of writing). Our alerts started at 10:28 AM Eastern on 4/13/2023. 

 

File SHA256 hash: 975c0d48c41d2ad76a242d5f7270f4bf8063bb9c753b375ab2c47c9e2060f562

Jameson
Getting noticed

We are now getting an additional file marked with different hashes. Also from [3-11].tlu.dl.delivery.mp.microsoft.com

 

W32.7F4CBDDDA2.RET.SBX.TG - SHA256: 7f4cbddda24faf170473706c062c8957d6bb422b285013c932c61e8dd4efb381

 

 

DarthKevin
Here to help

Same here.  1000+ alerts at the time of writing.

RobertMiranda
Here to help
martin-netx
Getting noticed

Yeah, seeing lots of this from multiple MX networks. Virus Total does not show any vendors identifying it as malicious.

 

I notice the following relating to the file in Securtiy Centre:

downloaded from [http://tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3d3c4265-57fd-450e-9bda-9fb5f4612........ So it's come from microsoft.com 

Feels like a false positive I'd say

jborgmeyer
New here

yep received the same alert

HASK2112
Conversationalist

We are seeing it also. All sites with Meraki's MX67 and MX84

richa
Conversationalist

Seeing this problem on MXs too.

 

All seems to source from Microsoft.

 

Nothing on VT suggesting it's malicious.

 

Talos website suggests low potential for malice.

 

Nothing in ThreatGrid yet to sandbox it.

richa
Conversationalist

richa_0-1681398332900.png

 

Ajasinski
Conversationalist

Same here- certainly appears to be a false positive. 

Dipen
Getting noticed

Same thing reached out to Meraki tech support... waiting for them revert us back with proper explanation. 

HaniAbuelkhair4
Getting noticed

Please keep us updated 

Dipen
Getting noticed

Sure thing normally it would take one business day for them to revert back

vsanch62
Conversationalist

New to the company and I received this alert and immediately scared me. Then I saw it originated from Microsoft and did a little googling and found this thread. Phew

Ajasinski
Conversationalist

Getting that alert saying 100s or 1000s of possible malicious downloads is certainly panic-inducing! 

Dipen
Getting noticed

Indeed at this point we are so fed up with those email that we took ourselves out from that specific email list. LOL

AVIF
Here to help
TRBO_KCMO
Getting noticed

Glad we can all collaborate and compare so quickly in the Community. Great relief!

Jameson
Getting noticed

Just had an additional file start popping up. 

URL root is: 1d.tlu.dl.delivery.mp.microsoft.com

File: W32.0E9CF9601C.RET.SBX.TG

SHA256: 0e9cf9601c14abd31bb02adfa0986ceb78af596cbd991e6cad89fe80ea959abd

Dave
Getting noticed

Yes, I'm seeing it also.  

ConnorL
Meraki Employee
Meraki Employee
TRBO_KCMO
Getting noticed

This one too

 

8dea8123-fd8f-492c-9c2d-7cdfab740447

SHA2567f4cbddda24faf170473706c062c8957d6bb422b285013c932c61e8dd4efb381
Disposition Clean
TITAN1212
New here

Saw this too on multiple customers. None of our AVs have found anything malicious that would relate to this alert from Meraki.

Barakaki
New here

This is not new believe it or not.  These windows updates have been reported months ago to Meraki. I have an open ticket from months ago trying to figure this out.  Meraki on the backend is reporting these as malware, but it wasnt being reported to the dashboard and/or email alerts.  Something changed today and now its actually reporting so I might finally have some resolution to my open ticket.

 

How I discovered the problem is that I enabled syslog logging and sent all my logs to papertrail.  I then setup an alert on when malware was downloaded and I kept getting these alerts in papertrail.  Heres the original ticket. 

 

Barakaki_0-1681399947151.png

 

There was never a resolution, meraki support could not help and they said their backend team was involved with the case.  I was never able to forcibly recreate the issue, so they were never able to resolve it.  This was happening across many clients with the same error/issue.

 

Heres a sample from 2 days ago from my papertrail app that went unreported to the dashboard and/or email alert.

 

Apr 11 10:20:04 98.151.19.171 logger <134>1 1681244404.194824387 OLGC_Firewall security_event security_filtering_file_scanned url=http://1d.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/ade20ec6-c563-480b-ad73-40580d...?P1=1681245007&amp;P2=404&amp;P3=2&amp;P4=X4AhVcAJt9jaRV%2fQCoOfA68Y3tgXZY4Hhvr8JWM6pe5%2fEIEDZAOWhdj0CK60cr4uGAgFEfe0%2b5r5q7kjJ%2foh3w%3d%3d src=192.168.1.192:54486 dst=209.197.3.8:80 mac=30:D1:6B:F1:7E:E7 name='' sha256=fc46caae796a5bfe5eb2a814d8f97fc91e6f710f68ca00832ccd7171fb550151 disposition=malicious action=block

 

I think my issue might finally get resolved now that its reporting to the dashboard and/or email alerts and its widespread.

molan
Here to help

Ya looking at the timeline in my security tools on one of the devices supposedly affected there is nothing going on except for attempts at windows updates.

 

2023-04-13 09_40_57-Device - Microsoft 365 security - Brave.png

 

so unless MS is compromised this is almost certainly a false positive 

Barakaki
New here

Where did my post go?

Barakaki
New here

This is not new believe it or not.  These windows updates have been reported months ago to Meraki. I have an open ticket from months ago trying to figure this out.  Meraki on the backend is reporting these as malware, but it wasnt being reported to the dashboard and/or email alerts.  Something changed today and now its actually reporting so I might finally have some resolution to my open ticket.

 

How I discovered the problem is that I enabled syslog logging and sent all my logs to papertrail.  I then setup an alert on when malware was downloaded and I kept getting these alerts in papertrail.  Heres the original ticket. 

 

Barakaki_0-1681400914211.png

 

 

There was never a resolution, meraki support could not help and they said their backend team was involved with the case.  I was never able to forcibly recreate the issue, so they were never able to resolve it.  This was happening across many clients with the same error/issue.

 

Heres a sample from 2 days ago from my papertrail app that went unreported to the dashboard and/or email alert.

 

Apr 11 10:20:04 98.151.25.111 logger <134>1 1681244404.194824387 Firewall security_event security_filtering_file_scanned url=http://1d.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/ade20ec6-c563-480b-ad73-40580d...?P1=1681245007&amp;P2=404&amp;P3=2&amp;P4=X4AhVcAJt9jaRV%2fQCoOfA68Y3tgXZY4Hhvr8JWM6pe5%2fEIEDZAOWhdj0CK60cr4uGAgFEfe0%2b5r5q7kjJ%2foh3w%3d%3d src=192.168.1.192:54486 dst=209.197.3.8:80 mac=30:D1:6B:F1:7E:E7 name='' sha256=fc46caae796a5bfe5eb2a814d8f97fc91e6f710f68ca00832ccd7171fb550151 disposition=malicious action=block

 

I think my issue might finally get resolved now that its reporting to the dashboard and/or email alerts and its widespread.

Dipen
Getting noticed

Here's what we got from Meraki Support:

 

Greetings,

Thank you for contacting Cisco Meraki Technical Support.

I would like to inform you that we are aware of the recent issue where a Microsoft update is being flagged as malicious by the AMP service on the MX platform. Our development team has been alerted and is currently investigating the matter. For updates on the progress of the investigation, please refer to this link: https://community.meraki.com/t5/Security-SD-WAN/MX-Malware-Blocking/m-p/191266#M44553. We will keep this thread updated as soon as we have more information on whether this is a false positive or not.



Thanks,

Jason Wu
Cisco Meraki Technical Support

Dipen
Getting noticed

.

troxelr
New here

That one is from 2019.

 

HaniAbuelkhair4
Getting noticed

HaniAbuelkhair4_1-1681401535773.png

 

ClockN
Conversationalist

Had thousands of these this morning. Every Windows machine sending through the firewall.

 

TRBO_KCMO
Getting noticed

We're still incrementing

HaniAbuelkhair4
Getting noticed

HaniAbuelkhair4_1-1681403847437.png

 

HaniAbuelkhair4
Getting noticed

HaniAbuelkhair4_0-1681403833587.png

 

Jameson
Getting noticed

We are now getting a new alert for the below file. Anybody else?


Source Location: b.c2r.ts.cdn.office.net

File: i640.c2rx (W32.7B9E2002CA.RET.SBX.TG)

SHA256: 7b9e2002cacef4817353464f9845e294845daef8b28adeab55e76b3c8278ff18

Robbace
Here to help

Same here Jameson

Jameson
Getting noticed

We are also following this new issue on this post: 2nd Malware Detected - i640.c2rx - The Meraki Community

Jameson
Getting noticed

Wanted to follow up here to see if others are experiencing the same thing we are. (tagging @ConnorL from Meraki)

 

Meraki marked the issue as "Resolved" on this post [RESOLVED] Security Center False Positive Alert - April 13th 2023 - The Meraki Community

 

However, we have had a total of 3 files that triggered Malware alerts today. So far 2 of the 3 are showing as "Clean" in the dashboard. 

 

Ultimately, I'm trying to determine if this "resolution" is for all of the files or just the two currently marked as "clean"?

 

File 1: [CLEAN] W32.7F4CBDDDA2.RET.SBX.TG - 7f4cbddda24faf170473706c062c8957d6bb422b285013c932c61e8dd4efb381


File 2: [MALICIOUS] W32.0E9CF9601C.RET.SBX.TG -  0e9cf9601c14abd31bb02adfa0986ceb78af596cbd991e6cad89fe80ea959abd


File 3: [CLEAN] i640.c2rx (W32.7B9E2002CA.RET.SBX.TG) -- 7b9e2002cacef4817353464f9845e294845daef8b28adeab55e76b3c8278ff18

Jameson
Getting noticed

Following up.. All 3 files are now marked as clean and have fallen out of my alerts. For me, this issue appears to be completed "resolved".

TRBO_KCMO
Getting noticed

Yep. It went completely retrospectively clean. It's a good day after all.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels