Security event repetitive

Reply
L4 Transporter

Security event repetitive

We have a security event that is repeated in a series of users, Not many users but the event is very frequent

 

---------------------

 

EVENT
Memory Corruption Exploit
AGENT TIME
21 May, 2019 at 6:08 (2 hours ago)
AGENT LOCAL TIME
21 May, 2019 at 6:08 (UTC +02:00) (2 hours ago)
REPORT TIME
21 May, 2019 at 6:10 (2 hours ago)
EVENT ID
ec66f123488b4f65a80648166e0581f1COMMAND LINE
C:\Windows\system32\svchost.exe -k netsvcs
PID
6208
PARENT PID
2644
FILE NAME
svchost.exe
FULL PATH
C:\Windows\SysWOW64\svchost.exe
FILE SIZE
20.5 KB
SHA 256
121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2
SIGNER
Microsoft Windows

---------------

 

what that means? any way to solve it or delete these repetitive events?

L2 Linker

Re: Security event repetitive

Hi,

 

The event means that Traps detected an attempt to exploit a Windows process.

They are several types of memory corruption exploit, you can find a list here fyi : https://docs.paloaltonetworks.com/traps/3-4/traps-endpoint-security-manager-admin/exploit-protection...

 

The way to "solve" these events (and more generally any Traps events) is to investigate further to see if it's an expected behavior (so these events  = false positives) or if it's a real threat detected on the systems. To investigate, you can retrieve data from the endpoints, you can ask help from your partners, etc. If its a False Positive, you can create an exception to exclude similar events, so they will not appear anymore on the GUI.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!