{"id":96339,"date":"2019-08-12T06:00:42","date_gmt":"2019-08-12T13:00:42","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96339"},"modified":"2025-06-02T19:47:00","modified_gmt":"2025-06-03T02:47:00","slug":"mcafee-amsi-integration-protects-against-malicious-scripts","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/","title":{"rendered":"McAfee AMSI Integration Protects Against Malicious Scripts"},"content":{"rendered":"<p>Following on from the <u><a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\">McAfee Protects against suspicious email attachments<\/a><\/u> blog, this blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee Endpoint products. The AMSI scanner within McAfee ENS 10.6 has already detected over 650,000 pieces of Malware since the start of 2019. This blog will help show you how to enable it, and explain why it should be enabled, by highlighting some of the malware we are able to detect with it.<\/p>\n<h2>ENS 10.6 and Above<\/h2>\n<p>The AMSI scanner will scan scripts once they have been executed. This enables the scanner to de-obfuscate the script and scan it using DAT content. This is useful as the original scripts can be heavily obfuscated and are difficult to generically detect, as shown in the image below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96340\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-1.png\" alt=\"\" width=\"695\" height=\"651\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-1.png 695w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-1-300x281.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-1-534x500.png 534w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; Obfuscated VBS script being de-obfuscated with AMSI<\/em><\/p>\n<h2>Enable the Scanner<\/h2>\n<p>By default, the AMSI scanner is set to observe mode. This means that the scanner is running but it will not block any detected scripts; instead it will appear in the ENS log and event viewer as show below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96341\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-2.png\" alt=\"\" width=\"1108\" height=\"874\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-2.png 1108w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-2-300x237.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-2-768x606.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-2-1024x808.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-2-634x500.png 634w\" sizes=\"auto, (max-width: 1108px) 100vw, 1108px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; Would Block in the Event log<\/em><\/p>\n<p>To actively block the detected threats, you need to de-select the following option in the ENS settings:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96342\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-3.png\" alt=\"\" width=\"871\" height=\"638\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-3.png 871w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-3-300x220.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-3-768x563.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-3-683x500.png 683w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3 &#8211; How to enable Blocking<\/em><\/p>\n<p>Once this has been done, the event log will show that the malicious script has now been blocked:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96343\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-4.png\" alt=\"\" width=\"993\" height=\"943\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-4.png 993w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-4-300x285.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-4-768x729.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-4-527x500.png 527w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-4-24x24.png 24w\" sizes=\"auto, (max-width: 993px) 100vw, 993px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4 &#8211; Action Blocked in<\/em><em>\u00a0Event Log<\/em><\/p>\n<h2>In the Wild<\/h2>\n<p>Since January 2019, we have observed over 650,000 detections and this is shown in the IP Geo Map below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96344\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-5.png\" alt=\"\" width=\"806\" height=\"479\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-5.png 806w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-5-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-5-768x456.png 768w\" sizes=\"auto, (max-width: 806px) 100vw, 806px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5 &#8211; Geo Map of all AMSI detection since January\u00a02019<\/em><\/p>\n<p>We are now able to block some of the most prevalent threats with AMSI. These include PowerMiner, Fileless MimiKatz and JS downloader families such as JS\/Nemucod.<\/p>\n<p>The section below describes how these families operate, and their infection spread across the globe.<\/p>\n<h3>PowerMiner<\/h3>\n<p>The PowerMiner malware is a cryptocurrency malware whose purpose is to infect as many machines as possible to mine Monero currency. The initial infection vector is via phishing emails which contain a batch file. Once executed, this batch file will download a malicious PowerShell script which will then begin the infection process.<\/p>\n<p>The infection flow is shown in the graph below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96345\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-6.png\" alt=\"\" width=\"942\" height=\"542\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-6.png 942w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-6-300x173.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-6-768x442.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-6-869x500.png 869w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6 &#8211; I<\/em><em>nfection flow of PowerMiner<\/em><\/p>\n<p>With the AMSI scanner, we can detect the malicious PowerShell script and stop the infection from occurring. The Geo IP Map below shows how this malware has spread across the globe:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96346\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-7.png\" alt=\"\" width=\"809\" height=\"483\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-7.png 809w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-7-300x179.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-7-768x459.png 768w\" sizes=\"auto, (max-width: 809px) 100vw, 809px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7 &#8211; Geo Map of PS\/PowerMiner!ams\u00a0 detection since January 2019<\/em><\/p>\n<p>McAfee Detects PowerMiner as PS\/PowerMiner!ams.a.<\/p>\n<h2>Fileless Mimikatz<\/h2>\n<p>Mimikatz is a tool which enables the extraction of passwords from the Windows LSASS. Mimikatz was previously used as a standalone tool, however malicious scripts have been created which download Mimikatz into memory and then execute it without it ever being downloaded to the local disk. An example of a fileless Mimikatz script is shown below (note: this can be heavily obfuscated):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96347\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-8.png\" alt=\"\" width=\"610\" height=\"95\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-8.png 610w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-8-300x47.png 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8 &#8211; Fileless Mimikatz PowerShell script<\/em><\/p>\n<p>The Geo IP Map below shows how fileless Mimikatz has spread across the globe:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96348\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-9.png\" alt=\"\" width=\"810\" height=\"485\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-9.png 810w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-9-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-9-768x460.png 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 9 &#8211; Geo IP Map of PS\/Mimikatz detection since January 2019<\/em><\/p>\n<p>McAfee can detect this malicious script as PS\/Mimikatz.a, PS\/Mimikatz.b, PS\/Mimikatz.c.<\/p>\n<h2>JS\/Downloader<\/h2>\n<p>JS downloaders are usually spread via email. The purpose of these JavaScript files is to download further payloads such as ransomware, password stealers and backdoors to further exploit the compromised machine. The infection chain is shown below, as well as an example phishing email:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96349\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-10.png\" alt=\"\" width=\"852\" height=\"385\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-10.png 852w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-10-300x136.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-10-768x347.png 768w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 10 &#8211; Infection flow of Js\/Downloader<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96350\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-11.png\" alt=\"\" width=\"843\" height=\"610\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-11.png 843w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-11-300x217.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-11-768x556.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-11-691x500.png 691w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 11 &#8211; Example phishing email distributing JS\/Downloader<\/em><\/p>\n<p>Below is the IP Geo Map of AMSI JS\/Downloader detections since January 2019:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96351\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-12.png\" alt=\"\" width=\"811\" height=\"481\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-12.png 811w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-12-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-12-768x455.png 768w\" sizes=\"auto, (max-width: 811px) 100vw, 811px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 12 &#8211; Geo Map of AMSI-FAJ detection since January 2019<\/em><\/p>\n<p>The AMSI scanner detects this threat as AMSI-FAJ.<\/p>\n<h2>MVISION Endpoint and ENS 10.7<\/h2>\n<p>MVISION Endpoint and ENS 10.7 (Not currently released) will use Real Protect Machine Learning to detect PowerShell AMSI generated content.<\/p>\n<p>This is done by extracting features from the AMSI buffers and running these against the ML classifier to decide if the script is malicious or not. An example of this is shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96353\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/08\/Figure-13-1.png\" alt=\"\" width=\"1397\" height=\"683\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-13-1.png 1397w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-13-1-300x147.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-13-1-768x375.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-13-1-1024x501.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/Figure-13-1-1023x500.png 1023w\" sizes=\"auto, (max-width: 1397px) 100vw, 1397px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Thanks to this detection technique, MVISION EndPoint can detect Zero-Day PowerShell threats.<\/p>\n<h2>Conclusion<\/h2>\n<p>We hope that this blog has helped highlight why enabling AMSI is important and how it will help keep your environments safe.<\/p>\n<p>We recommend our customers who are using ENS 10.6 on a Windows 10 environment enable AMSI in \u2018Block\u2019 mode so that when a malicious script is detected it will be terminated. This will protect Endpoints from the threats mentioned in this blog, as well as countless others.<\/p>\n<p>Customers using MVISION EndPoint are protected by default and do not need to enable \u2018Block\u2019 mode.<\/p>\n<p>We also recommend reading <u><a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Protects against suspicious email attachments<\/a><\/u> which will help protect you against malware being spread via email, such as the JS\/Downloaders described in this blog.<\/p>\n<p><strong><em>All testing was performed with the V3 DAT package 3637.0 which contains the latest AMSI Signatures. Signatures are being added to the V3 DAT package daily, so we recommend our customers always use the latest ones.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.<\/p>\n","protected":false},"author":774,"featured_media":96272,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[849],"class_list":["post-96339","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-12T13:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Oliver Devane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Devane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\"},\"author\":{\"name\":\"Oliver Devane\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a\"},\"headline\":\"McAfee AMSI Integration Protects Against Malicious Scripts\",\"datePublished\":\"2019-08-12T13:00:42+00:00\",\"dateModified\":\"2025-06-03T02:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\"},\"wordCount\":851,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\",\"name\":\"McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"datePublished\":\"2019-08-12T13:00:42+00:00\",\"dateModified\":\"2025-06-03T02:47:00+00:00\",\"description\":\"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"width\":2048,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee AMSI Integration Protects Against Malicious Scripts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a\",\"name\":\"Oliver Devane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/145287b0eca301fc80d99baf060dd274\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg\",\"caption\":\"Oliver Devane\"},\"description\":\"Oliver Devane is currently a Senior Security Researcher at McAfee. He is based in the UK office and has over 10 years of experience analyzing Malware and Potentially Unwanted Programs.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/oliver-devane-1a528749\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/oliver-devane\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog","description":"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog","og_description":"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-08-12T13:00:42+00:00","article_modified_time":"2025-06-03T02:47:00+00:00","og_image":[{"width":2048,"height":1350,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","type":"image\/jpeg"}],"author":"Oliver Devane","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Oliver Devane","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/"},"author":{"name":"Oliver Devane","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a"},"headline":"McAfee AMSI Integration Protects Against Malicious Scripts","datePublished":"2019-08-12T13:00:42+00:00","dateModified":"2025-06-03T02:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/"},"wordCount":851,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/","name":"McAfee AMSI Integration Protects Against Malicious Scripts | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","datePublished":"2019-08-12T13:00:42+00:00","dateModified":"2025-06-03T02:47:00+00:00","description":"This blog describes how the AMSI (Antimalware Scan Interface) is used within the various McAfee products, and highlights some of the malware we are able to detect with it.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","width":2048,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-amsi-integration-protects-against-malicious-scripts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee AMSI Integration Protects Against Malicious Scripts"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a","name":"Oliver Devane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/145287b0eca301fc80d99baf060dd274","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg","caption":"Oliver Devane"},"description":"Oliver Devane is currently a Senior Security Researcher at McAfee. He is based in the UK office and has over 10 years of experience analyzing Malware and Potentially Unwanted Programs.","sameAs":["https:\/\/www.linkedin.com\/in\/oliver-devane-1a528749\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/oliver-devane\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/774"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96339"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96339\/revisions"}],"predecessor-version":[{"id":214944,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96339\/revisions\/214944"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96272"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96339"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}