New malware flagged from Windows Update downloads


New malware flagged from Windows Update downloads

We have a MX84 that alerted this morning about a "Retrospective" File Disposition Change.  The event in question appears to be an exe download:



sha256: e9ab8d11545dbad0ebf6ef6a35750d7051b0af2e72ba1fd8d464203140bcb55f 


...downloaded from an apparently legit Microsoft domain:


I am unable to find any documentation detailing why this file is being flagged.  The virustotal results look clean as well.  Can anyone shed any light?

6 Replies 6
Getting noticed

We are also starting to get hammered with this alert -- also looking into this now.

Have either of you reached out to support about it?

I have. When I hear back I will update here.

Support came back and just said "Because Talos determined it is malicious.  You can whitelist the domain if you'd like." 


While there is nothing technically wrong in that answer, it really isn't helpful.  If Talos (and AMP by extension) is flagging false positives against Windows Update files, then that is a problem.  Conversely, if MS is serving up malicious files, then that is also a problem. 


Unfortunately, I do not have access to Talos Threat Grid to see anything further on this file.


Fully agree. Useless response by support.

Here to help

Seeing the same thing, but for different file.


File Hash:


Download Info:

2018-12-20 8:12 AM EST, by

File URI / Server IP:

hxxp:// (

Original Disposition:


Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.