365 Defender 'SuspiciousScriptDrop' malware was prevented alerts, False positive?

Anonymous
2022-02-12T22:22:25.643+00:00

Hi all,
for two days perhaps coincidentally since the security updates were released via SCCM,
the following alarms alerts are continuously generated on Windows Server 2019 servers by Microsoft 365 Defender:
'SuspiciousScriptDrop' malware was prevented
'SuspiciousScriptDrop' malware was prevented on a Microsoft SQL server
'SuspiciousScriptDrop' malware was prevented on an IIS Web server
the event seems to be generated by the execution of a powershell script which always changes the final part of the name:
_PSScriptPolicyTest_e5xewz2b.d1e.ps1
__PSScriptPolicyTest_hfszzy13.twt.ps1
__PSScriptPolicyTest_mvd5cukz.i50.ps1
__PSScriptPolicyTest_buadpcch.hak.ps1
the malware detected is the following (VirusTotal detection ratio 0/0):
Trojan:JS/SuspiciousScriptDrop.B!pwsh
the file path is always:
C:\Windows\Temp\
the usser is always the LocalSystem user:
NT AUTHORITY\SYSTEM
command line:
powershell.exe -NoLogo -NoProfile -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File Maintenance.ps1

Why are these alarms generated? Do we have to go deep into their analysis or are they false positives?

Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,842 questions
Microsoft Configuration Manager Updates
Microsoft Configuration Manager Updates
Microsoft Configuration Manager: An integrated solution for for managing large groups of personal computers and servers.Updates: Broadly released fixes addressing specific issue(s) or related bug(s). Updates may also include new or modified features (i.e. changing default behavior).
1,050 questions
0 comments No comments
{count} votes

Accepted answer
  1. Vadims Podāns 9,121 Reputation points MVP
    2022-02-14T09:32:26.637+00:00

    Do we have to go deep into their analysis or are they false positives?

    they are false-positive. These scripts are automatically generated and dropped to Temp folder (system or user, depending on a running user account) by PowerShell itself. Since version 5.1, PowerShell actively enforces constrained (restrictive) language mode depending on SRP/Applocker enforcement. When you start the PowerShell, a temporary script is generated and attempted to execute. If file is blocked, PowerShell starts in constrained language mode which greatly limits the functionality of the PS engine. If file is not blocked, PowerShell starts in unrestricted language mode. Here are more details from official PowerShell Team blog: https://devblogs.microsoft.com/powershell/powershell-the-blue-team/#constrained-powershell

    you can completely ignore these that contain "PSScriptPolicyTest" alerts.

    1 person found this answer helpful.

2 additional answers

Sort by: Most helpful
  1. Reza-Ameri 16,981 Reputation points
    2022-02-13T16:25:26.823+00:00

    Try submit the script to the Microsoft Anti-Malware portal, take a look at:
    https://www.microsoft.com/en-us/wdsi/filesubmission
    And see if it being detected as malware too?
    If not you may submit a ticket to the Microsoft Defender 365 team.

    0 comments No comments

  2. Anonymous
    2022-02-14T23:12:02.63+00:00

    @Vadims Podāns thank you for your answer.
    I thought it was a false positive, but I wanted the confirmation, also because it seems strange to me the alarm was generated only on 4 servers out of 200.
    Thank you,
    Alfio


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.