cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

I have two users that caused the alert in the title. Is this something I should be concerned about as the documents were created by users and not using any macros. This started about two-three weeks ago. We are running ENS 10.7.0 Threat Source Process Name: WINWORD.EXE Threat Target Process Name: WMIUTILS.DLL Threat Target File Path: \DEVICE\HARDDISKVOLUME4\WINDOWS\SYSWOW64\WBEM\WMIUTILS.DLL 1st user Source Description: "C:\Program Files\Microsoft Office\Office15\WINWORD.EXE" /n "Network drive\.docx" /o "" 2nd user Source Description: "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /vu "local C:\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\PNYJM0QP\.docx"
9 Replies
yaz
Employee
Employee
Report Inappropriate Content
Message 2 of 10

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Hi @User30073109 

Thanks for reaching out to Community.

It looks like this issue is happening with On access scan. 

Can you kindly share us the On access scan logs so that we can look into this in detail?

 

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

This is all the information I see in the log. Is there something specific I need to provide as the OnAccessScan log doesn't give any information that I can see? The other log gives some more information I didn't provide before.

 

OnAccessScan_Activity log

2020-12-01 10:00:45.460Z|Activity|oasbl |mfetp | 2512| 3064|OAS |oasbl.cpp(2594) | AMCore content version = 4273.0

 

ExploitPrevention_Activity log

2020-11-20 13:02:51.668Z|Activity|ApBl |mfeesp | 2576| 11620|BOPAP |XModuleEvents.cpp(844) | first user ran C:\Program Files\Microsoft Office\Office15\WINWORD.EXE, which accessed the process wmiutils.dll, violating the rule "T1047 - Weaponized OLE object infection via WMI". Access was allowed because the rule wasn't configured to block.


2020-11-24 13:03:35.643Z|Activity|ApBl |mfeesp | 2184| 6092|BOPAP |XModuleEvents.cpp(844) | First User ran C:\Program Files\Microsoft Office\Office15\WINWORD.EXE, which accessed the process wmiutils.dll, violating the rule "T1047 - Weaponized OLE object infection via WMI". Access was allowed because the rule wasn't configured to block.


2020-12-01 13:08:24.145Z|Activity|ApBl |mfeesp | 2168| 4660|BOPAP |XModuleEvents.cpp(844) |

the first user ran C:\Program Files\Microsoft Office\Office15\WINWORD.EXE, which accessed the process wmiutils.dll, violating the rule "T1047 - Weaponized OLE object infection via WMI". Access was allowed because the rule wasn't configured to block.

 

2020-12-02 14:25:33.932Z|Activity|ApBl |mfeesp | 6168| 14164|BOPAP |XModuleEvents.cpp(844) | Second user ran C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, which accessed the process wmiutils.dll, violating the rule "T1047 - Weaponized OLE object infection via WMI". Access was allowed because the rule wasn't configured to block.


2020-12-02 14:25:33.934Z|Activity|ApBl |mfeesp | 6168| 4428|BOPAP |XModuleEvents.cpp(844) | 

The second user ran C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE, which accessed the process WMIUTILS.DLL, violating the rule "T1047 - Weaponized OLE object infection via WMI". Access was allowed because the rule wasn't configured to block.

yaz
Employee
Employee
Report Inappropriate Content
Message 4 of 10

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Hi @User30073109 

Thanks for providing us with details.

I understand the issue is happening with Exploit prevention and not on access scan. 

This rule is marked medium and is not blocked by default. 

Hence you see this report. 

Please refer to the screenshot attached. 

You can decide on your environment if this needs to be blocked or allowed. 

This does not looks like False positive but you can block by following the screenshot. 

Kindly let me know if I have answered your query. 

If yes, Kindly Mark as solution so that together we can help other community members. 

If no, please post your queries and we can assist you again. 

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

No Screenshot attached.

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Hello,

 

There was no screenshot provided for me to follow. I would like to block this for my environment.

yaz
Employee
Employee
Report Inappropriate Content
Message 7 of 10

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Hi @User30073109 

Unfortunately, it looks like screenshot is not coming  through. I am not too sure exactly. 

However, you can go to the Exploit prevention policies and search for this rule. 

You can block and report accordingly and give a Wake up call for Agent. 

Was my reply helpful?

If yes, please provide me with Kudo. If this resolves your issue, then kindly mark this as solution so that together we can help other community members. 

yaz
Employee
Employee
Report Inappropriate Content
Message 8 of 10

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

HI @User30073109 

Kindly find the attached screenshot now. 

Capture.JPG

 

I believe this gives you more input on blocking this rule. 

Former Member
Not applicable
Report Inappropriate Content
Message 9 of 10

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Hello,

 

I found the subject alert in 4 different user laptops. I am wondering to know during last 6 months, does MacAfee find any more info about this alert? or still marks it as medium risk and recommend to block it?

 

Thanks for your help

 

Re: T1047 - Weaponized OLE object infection via WMI - legitimate or false positive

Curious after two years was there any answer on this?

I am not a security expert and would like guidance on how to handle these without crippling operations.

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from product experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by employees.
Join the Community
Join the Community