NoVirusThanks OSArmor

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
Yes, I think so. You get it over and over correct? I assume it's coming from the same place as on my systems. The whitelist is not very good for that command line I'm afraid. The activator of the drop mechanism happens out of the range of monitoring, so it appears to be all Windows based in the command line. However, it's not. I suppose NVT has run across this many times, so maybe he will add a comment or something...:)
 
F

ForgottenSeer 58943

False positive with the latest version and Sticky Password. I don't use Sticky but this was forwarded to me by someone else here and I checked, it's a FP. Remember, SP launches a command line when Chrome launches, which triggers this. Adding an exclusion doesn't fix it, in the short term he disabled the rule entirely.

Date/Time: 4/4/2018 6:57:47 PM
Process: [2432]C:\Windows\SysWOW64\cmd.exe
Parent: [7944]C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
Rule: BlockSuspiciousCmdlines
Rule Name: Block execution of suspicious command-line strings
Command Line: C:\WINDOWS\system32\cmd.exe /d /c "C:\Program Files (x86)\Sticky Password\spNMHost.exe" chrome-extension://bnfdmghkeppfadphbnkjcicejfepnbfe/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.a2c806cd0a465d0c > \\.\pipe\chrome.nativeMessaging.out.a2c806cd0a465d0c
Signer:
Parent Signer: Google Inc
User/Domain:
Integrity Level: Medium
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
However I searched the .tmp file on the disk and it does not exist, do you know why? :unsure:

Yes, I couldn't find it either. It must be instantly deleted. I tried to catch it, but I think the drop and delete are over in a matter of a blink of an eye. I thought I saw one of them once, but it was gone very fast...
 

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) test49:
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test49.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Improved Block execution of .wsf scripts
+ Improved Block suspicious command-lines
+ Disabled /silent and /verysilent uninstallation
+ Improved Prevent important Windows services from being disabled
+ Fixed some false positives

To install it, first uninstall the previous build, then reboot (not really needed but may help), and install the new build.

@ForgottenSeer 58943 @128BPM @Stas

All reported FPs should be fixed.

The csc.exe execution is very hard to whitelist, personally I block csc.exe entirely (I don't use any .NET app here).

Blocking that events should not cause any issue anyway.
 

Stas

Level 10
Verified
Well-known
Feb 21, 2015
456
All reported FPs should be fixed.
FP's with IDM not fixed and there's a problem with notification on multiple alerts at the same time only one notification alert appears, the rest alerts can only be seen in log file.
OSArmor.jpg
 
D

Deleted member 178

FP's with IDM not fixed and there's a problem with notification on multiple alerts at the same time only one notification alert appears, the rest alerts can only be seen in log file.
View attachment 185109

In Advanced > Attack Mitigation Rules :

Did you ticked "prevent regserver32.exe from loading dlls"? seems yes (based on your log) , so don't wonder why... (it is not an FP, it is expected behavior).

You have to create an exception rule if you want to keep the mitigation rule enabled.
 
Last edited by a moderator:
  • Like
Reactions: harlan4096

Stas

Level 10
Verified
Well-known
Feb 21, 2015
456
In Advanced > Attack Mitigation Rules :

Did you ticked "prevent regserver32.exe from loading dlls"? seems yes (based on your log) , so don't wonder why... (it is not an FP, it is expected behavior).

You have to create an exception rule if you want to keep the mitigation rule enabled.
I thought it could be whitelisted internally, anyway I excluded all four alerts but problem with multiple alerts at the same time should be fixed.
 
  • Like
Reactions: AtlBo

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) test50:
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test50.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Fixed a typo on the Configurator GUI
+ Block loading of .inf files via InstallHinfSection\LaunchINFSection
+ Improved Block suspicious command-lines
+ Improved Block suspicious Svchost.exe process behaviors
+ Improved Block execution of suspicious scripts
+ Improved support for multiple alerts
+ Fixed some false positives

To install it, first uninstall the previous build, then reboot (not really needed but may help), and install the new build.

If you find any false positive please let me know.

@Stas

FP should be fixed now, please confirm.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top