Jump to content

Exploit attempt blocked BLOCK C:\windows\system32\VBScript.dll


bartonphelps

Recommended Posts

We are having a similar issue. Near 4:00 est exploit detection began blocking a number of vbscript based tools we use within Word as part of our document processing add-ins. Unfortunately we have had to disable exploit detection as it prevented Word from launching. I assume this was part of a definition update. Can anyone provides any details about the update that was released near this time?

Link to post
Share on other sites

My company is also seeing a few of these alerts starting yesterday around 5PM ET, but only on the few clients that auto-updated to Anti-Exploit Ver. 1.13.2.98.   The ones sill on 1.12.2.147 are not having the problem.  As far as I know the users haven't seen any issues themselves, but still working to confirm that.  I've opened up a case with support and have disabled the MBAE auto-update feature for now.  The alerts we're getting look like this:

8/28/2019 10:58:13 AM PCNAME 10.x.x.x     Exploit attempt blocked BLOCK                   Login    Internet Explorer                C:\Program Files\Internet Explorer\iexplore.exe Attacked application: C:\Program Files\Internet Explorer\iexplore.exe; Parent process name: explorer.exe; Layer: Application Hardening; API ID: 900; Address: ; Module: ; AddressType: ; StackTop: ; StackBottom: ; StackPointer: ; Extra:

 

 

Link to post
Share on other sites

32 minutes ago, JimF said:

Modification to my initial thread... Some of the alerts we are getting show "C:\Windows\SysWOW64\vbscript.dll" like below, but others don't like in my original post.  Waiting on response from support.

8/28/2019 9:11:05 AM  PCNAME 10.x.x.x      Exploit attempt blocked BLOCK                C:\Windows\SysWOW64\vbscript.dll      Login    Internet Explorer             C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE Attacked application: C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE; Parent process name: iexplore.exe; Layer: Application Hardening; API ID: 210; Address: ; Module: ; AddressType: ; StackTop: ; StackBottom: ; StackPointer: ; Extra:

 

 

 

 

Link to post
Share on other sites

We are also seeing this issue from several of our clients but the Anti Exploit versions vary from  1.9., 1.12.2.14 and 1.13.2.98. All pc's are running windows 7 32bit and are at different patch levels. At this point there seems to be no rhyme or reason to what we are seeing. 

Link to post
Share on other sites

  • Staff

It is because of the new version update - It is a metered release which is why only few machines have been updated and are affected now. I have pushed in a silent update to the affected machines, it typically does not require a reboot or restart of Malwarebytes Anti-Exploit service for it to take effect. But if you still see these blocks on any system, please restart the MBAE service.

The fix I pushed was to uncheck the following settings.

Apologize for the inconvenience caused. Thanks for your patience.

image.png.43f97e62ce8b2225464a04498aef3641.png

Link to post
Share on other sites

  • Staff

Hi All,

I wanted to give you all some background on the VBScript protection and the issues it caused. In the recent past, we have come across many VBScript engine exploit attacks in the wild.
Refer 
https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/
https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html

The protection we introduced in the new version of MBAE 1.13 blocks these exploit attacks. This protection has been automatically enabled for a long time now in our consumer product. 
However, in Business environments, the usage of 3rd party plugins and extensions which still use this vulnerable VBScript library in legitimate cases is high, as we learnt this week with the false positives.
We had to turn off (not disable) the protection - meaning users can turn it back on if they want to restrict usage of this vulnerable library within their organization, considering good security practices.

We are trying to research and find a way to distinguish between these legitimate cases and the true exploit attacks. From our past research into this, there is not a lot to differentiate between the two, with these plugins behaving very similar to how an exploit would. 

Will keep you all posted.

Thank you. 

Edited by Arthi
Link to post
Share on other sites

our pcs are having the same issue but it looks like it is happening when opening IE. 
The newest version does uncheck the options and not show the issue but it is still not a fix just a work around.

I was wondering if there was an eta on a fix or what the status on this was for being fixed?

Thanks,

Brian

Link to post
Share on other sites

  • Staff

This is applicable for both IE and Office.

On 8/30/2019 at 3:01 PM, Arthi said:

Hi All,

I wanted to give you all some background on the VBScript protection and the issues it caused. In the recent past, we have come across many VBScript engine exploit attacks in the wild.
Refer 
https://blog.malwarebytes.com/threat-analysis/2018/05/internet-explorer-zero-day-browser-attack/
https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html

The protection we introduced in the new version of MBAE 1.13 blocks these exploit attacks. This protection has been automatically enabled for a long time now in our consumer product. 
However, in Business environments, the usage of 3rd party plugins and extensions which still use this vulnerable VBScript library in legitimate cases is high, as we learnt this week with the false positives.
We had to turn off (not disable) the protection - meaning users can turn it back on if they want to restrict usage of this vulnerable library within their organization, considering good security practices.

We are trying to research and find a way to distinguish between these legitimate cases and the true exploit attacks. From our past research into this, there is not a lot to differentiate between the two, with these plugins behaving very similar to how an exploit would. 

Will keep you all posted.

Thank you. 

 

Link to post
Share on other sites

  • 2 weeks later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.