Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Any one get IPS alert "MALWARE-OTHER Windows Management Instrumentation manipulation attempt" ?

We have been getting these email alerts to our network team from our main Sophos UTM since Tuesday morning. 

  

=============================================================

Message........: MALWARE-OTHER Windows Management Instrumentation manipulation attempt

Details........: https://www.snort.org/search?query=49570

Packet dropped.: yes

Classification.: A Network Trojan was Detected IP protocol....: 6 (TCP)

Source IP address: <SophosEndpointProtection-IP> Source port: 80 (http) Destination IP address: <Sophos-UTM-IP>  Destination port: 64218

--

HA Status          : HA MASTER (node id: 2)

System Uptime      : 0 days 0 hours 18 minutes

System Load        : 4.05

System Version     : Sophos UTM 9.604-2

==========================================================

 

(2) The IPS log shows following summary

@12:18:34 action="drop" reason="MALWARE-OTHER Windows Management Instrumentation manipulation attempt" srcip="23.32.80.135" srcport="80" sid="49570" class="A Network Trojan was Detected"

@12:19:04 action="drop" reason="MALWARE-OTHER Windows Management Instrumentation manipulation attempt" srcip="23.76.197.134" srcport="80" sid="49570" class="A Network Trojan was Detected"

@12:19:35 action="drop" reason="MALWARE-OTHER Windows Management Instrumentation manipulation attempt" srcip="184.25.98.243" srcport="80" sid="49570" class="A Network Trojan was Detected"

 

(3) Since it is outbound on port 80, our 'WebProtection' shows this following sample summary...

12:19:04 method="GET" dstip="23.76.197.134" statuscode="200" cached="0" url="d1.sophosupd.com/.../1ab6fc7acbfce20ac8782ae88318a252x000.dat"

12:19:34 method="GET" dstip="23.32.80.135"  statuscode="200" cached="0"  url="http://d1.sophosupd.com/update/1ab6fc7acbfce20ac8782ae88318a252x000.dat"

12:20:04 method="GET" dstip="184.25.98.243" statuscode="200" cached="1" url="http://dci.sophosupd.com/update/3/25/325420ec2b9d8646efcfea111f80f01f.dat"

 

(4) The IPS log does not shows any detailed other that the SNORT# 49570 .   Googling around found this link...

https://snort.org/rule_docs/1-49570

 

 

Any suggestions?   We are getting 30-40 email alerts every hour.

 

Thanks,

Bob Gausman



This thread was automatically locked due to age.
Parents
  • Bob, please edit your post so that it contains actual IPs and complete log lines.  Obfuscate IPs like 64.x.y.183, 10.x.y.33, 172.2x.y.22, 192.168.x.11.

    This may be a false positive due to an erroneous pattern, but it's difficult to say without a bit more context.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Thanks Bob for chime in,

     

    Yes these where false positives.   All traffic was Sophos Updates.  Alert msg stopped yesterday around 15:00

     

    These are the five dst IP's showing up in alert messages.   

     

    Destination IP address: 10.xxx.xxx.3 (utm-3)

    Source IP address: 104.119.115.86 (a104-119-115-86.deploy.static.akamaitechnologies.com)Source port: 80 (http)

    Source IP address: 184.25.98.243 (a184-25-98-243.deploy.static.akamaitechnologies.com)Source port: 80 (http)

    Source IP address: 23.40.18.92 (a23-40-18-92.deploy.static.akamaitechnologies.com)Source port: 80 (http)

    Source IP address: 23.32.80.135 (a23-32-80-135.deploy.static.akamaitechnologies.com)Source port: 80 (http)

    Source IP address: 23.56.203.90 (a23-56-203-90.deploy.static.akamaitechnologies.com)Source port: 80 (http)

     

    Good thing these where HTTP so I had excellent detail logging.   Some of the UTM#3 web log detail

    ==============================================================================================

    2019:07:16-00:21:07 cmh-utm-3-1 httpproxy[9383]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.x.x.99" dstip="104.119.115.86" user="" group="" ad_domain="" statuscode="200" cached="1" profile="REF_HttProContaInterNetwo (Transparent Proxy [none])" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="461" request="0xd553100" url="http://d1.sophosupd.com/update/catalogue/sdds.MAC2019-4.5.xml" referer="" error="" authtime="0" dnstime="52270" aptptime="345" cattime="0" avscantime="0" fullreqtime="75371" device="0" auth="0" ua="AutoUpdate/5.14.36 SDDS/2.0 (u= P7 c= 32c5cb05-3622 i= )" exceptions="av,sandbox,auth,content,url,ssl,certcheck,certdate,mime,fileextension,size" application="sophupda" app-id="794"

     

    2019:07:16-00:48:39 cmh-utm-3-1 httpproxy[9383]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.x.x.114" dstip="104.119.115.86" user="" group="" ad_domain="" statuscode="200" cached="1" profile="REF_HttProContaInterNetwo3 (Non-Hospital WebProfile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="4121" request="0xdcaa1500" url="http://dci.sophosupd.com/update/3/25/325420ec2b9d8646efcfea111f80f01f.dat" referer="" error="" authtime="0" dnstime="18914" aptptime="248" cattime="0" avscantime="0" fullreqtime="145139" device="0" auth="0" ua="AutoUpdate/5.14.36 SDDS/2.0 (u= P7 c=c051c80c i= )" exceptions="av,sandbox,auth,content,url,ssl,certcheck,certdate,mime,application,fileextension,size" application="sophupda" app-id="794"

     

    2019:07:16-00:48:58 cmh-utm-3-1 httpproxy[9383]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.x.x.89" dstip="104.119.115.86" user="WS_RM5" group="" ad_domain="" statuscode="200" cached="1" profile="REF_HttProContaInterNetwo (Transparent Proxy [none])" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="460" request="0xe0284300" url="http://d1.sophosupd.com/update/catalogue/sdds.SUM2018-2.1.xml" referer="" error="" authtime="0" dnstime="892" aptptime="225" cattime="0" avscantime="0" fullreqtime="40204" device="0" auth="0" ua="AutoUpdate/5.14.36 SDDS/2.0 (u= P7 c= 6b7620aa i= )" exceptions="av,sandbox,auth,content,url,ssl,certcheck,certdate,mime,fileextension,size"

     

    2019:07:16-01:18:59 cmh-utm-3-1 httpproxy[9383]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.x.x.251" dstip="104.119.115.86" user="" group="" ad_domain="" statuscode="200" cached="1" profile="REF_HttProContaInterNetwo (Transparent Proxy [none])" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="4121" request="0xd15ac300" url="http://dci.sophosupd.com/update/3/25/325420ec2b9d8646efcfea111f80f01f.dat" referer="" error="" authtime="0" dnstime="20701" aptptime="206" cattime="0" avscantime="0" fullreqtime="147695" device="0" auth="0" ua="AutoUpdate/5.14.36 SDDS/2.0 (u= P7 c= becb6ec4 i= )" exceptions="av,sandbox,auth,content,url,ssl,certcheck,certdate,mime,fileextension,size" application="sophupda" app-id="794"

     

    2019:07:16-09:41:26 cmh-utm-3-1 httpproxy[9383]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.x.x.99" dstip="104.119.115.86" user="JMF" group="" ad_domain="" statuscode="200" cached="1" profile="REF_HttProContaInterNetwo (Transparent Proxy [none])" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="460" request="0xc7ef2000" url="http://d1.sophosupd.com/update/catalogue/sdds.SUM2018-2.1.xml" referer="" error="" authtime="0" dnstime="0" aptptime="252" cattime="0" avscantime="0" fullreqtime="17258" device="0" auth="0" ua="AutoUpdate/5.10.139 SDDS/2.0 (u= P7 c= ded5b89c i= )" exceptions="av,sandbox,auth,content,url,ssl,certcheck,certdate,mime,fileextension,size" application="sophupda" app-id="794"

     

     

  • Update:  We are no longer getting the SNORT alerts so this was probably been fixed by Sophos definition update.  

     

    While we are talking about Sophos update,  we get these messages regard Sophos Up2Date from two of the three Sophos UTMs...

    First started on our 'public' many months ago then after the firmware upgrade to 9.6.03 on UTM2 about a month ago it also started..  It is always for a 15 minute period.

    By the 'public' is is Sophos UTM free firewall only software appliance and UTM2 is Sophos UTM Network Protection licensed.  

    Not worried about this - just extra noise... 

Reply
  • Update:  We are no longer getting the SNORT alerts so this was probably been fixed by Sophos definition update.  

     

    While we are talking about Sophos update,  we get these messages regard Sophos Up2Date from two of the three Sophos UTMs...

    First started on our 'public' many months ago then after the firmware upgrade to 9.6.03 on UTM2 about a month ago it also started..  It is always for a 15 minute period.

    By the 'public' is is Sophos UTM free firewall only software appliance and UTM2 is Sophos UTM Network Protection licensed.  

    Not worried about this - just extra noise... 

Children