Downadup/ Conficker worm versus HIPS

Discussion in 'other anti-malware software' started by aigle, Jan 19, 2009.

Thread Status:
Not open for further replies.
  1. neksus

    neksus Registered Member

    Joined:
    Nov 27, 2008
    Posts:
    54
    Yes LUA stops this particular sort of "attackers" with no fuss, and DW/GW/some HIPS will do it easily under admin,
    but it gives way more pleasure to spot and disintegrate the sucker yourself, with autorun disabled for removable drives.
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Actually if u are user of CFP, you will know it better. Being a classical HIPs with complex parent child relationship for executables, it,s too chatty. So I have tweaked rules( while keeping paranoid settings) to get the minimum of alerts. I will give u examples:

    1- I allowed svchost.exe to creat any file anywhere otherwise I get too many alerts about it creating/ modifying file that was legit but bothersome for me.

    Now here the malicious dll( vmx) and autorun files are created in USB devices via svchost.exe so during my testing it was a puzzle for me that which process is actually creating these files. I did not know until after many tries I found it out.

    2- Similarly a dll in system32 is created by svchost.exe that my custom rules allowed silently.

    3- I allow creation of tmp files globally without any pop up in my rules, so i never got an alert about creation of tmp file( ?driver) in this case.

    4- More worse, just think of it. CFP intercept any dll execution by any process by default but it gives literally dozens of pop ups while executing legit applications, so i made a custom rule to allow any dll to be executed by any parent from anywhere.

    Now if malicious dll is not spoofed as a vmx, you can guess what will happen. I will not get even a single alert and malware will execute n do its harm. :eek: :eek:

    BTW, an off topic Q: I noticed that when u install CFP it intercepts execution of exe files only if u add them in image execution control settings but dlls execution is intercepted without such settings. Am I correct, if so why there is such a diffrence? Thanks
     
  3. virtumonde

    virtumonde Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    504
    Appreciate everybody's results and time spent.This is real malware and not some Poc that i don't know if it can be used in real situation or not.
    As Aigle & alex_s mentioned about comodo & OA's results i want to ask isn't one pop-up too litle from a classic HIPS?
    I get two if i drag & drop files to my media player.
    Are the same results obtained with Real Time Defender or SSM?
     
  4. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Hmmm... You are thinking some thing super natural. :) What will be this rule? For wat application and deny access to which HD? And how many dozens useless pop ups this rule will create. Not practical at all IMO.
     
  5. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i meant to block executable files(dll) to access to write to the disko_O
     
  6. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Yes, it is too little. Infact I expect a classical HIPS to contain the damage even if u allow the sample to execute.

    Now I realize how simple it might be for a clever malware to bypass a classical HIPS. :rolleyes:
     
  7. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i think it will be a good idea to have hips + sandbox type combo,i think more security;)
     
  8. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    upon default installation of CIS(without AV) it didn't cause this.maybe it is because it installs in clean pc mode so only new files are recieving warnings :)
     
  9. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
    Yes, I think this is too little. Mike said they overlooked this problem, but in a short time they will take care of. Let us wait a bit :)
     
  10. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    thats what came up with fresh comodo installation,paranoid mode and maxxed out image execution controll
    see attached archive...
    http://rapidshare.com/files/186766019/CPF.rar

    (do not worry peter,its just photos here) :)

    will test it vs md trial just for the heck of it
     
    Last edited: Jan 20, 2009
  11. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    ok :D omg md really impressed me...
    it also monitors functions that CIS does not.. like in pics 29 and 39
    definately blocks it *lol* what a storm of clicking

    http://rapidshare.com/files/186782286/MD.rar

    if i am not too lazy i might try OA after my snack..it should itercept the .bat files creation and the .vmx but i am not so sure about the registry, it is not supposed to ,besides autorun ones
     
  12. virtumonde

    virtumonde Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    504
    Yes that's why i ask.An unpleasant but common infection Vundo will get you bored till it reaches system32 using HIPS.
    Also i don't know if all the damage can be contained if allowed to the end but if u terminate the process during 3-4 pop ups is gone, Nothing Happened.Yet this Conficker escapes that's why i'm puzzled.

    Good to know.OA has always been quickly touch with user suggestions.CAn't wait to try the final build as i think this one is gonna work properly on my PC.
     
  13. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    thanks chris for the info:thumb:
     
  14. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
  15. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    i do not think im doing something wrong,but SRP does not block the .dll file :O
    LUA itself on the other hand prevents its writing on sys32
     
  16. Dark Star 72

    Dark Star 72 Registered Member

    Joined:
    May 27, 2007
    Posts:
    778
    Rmus,
    Both Executable Lockdown and the new Returnil beta Anti-Execute can be configured for Default - Deny. They can also be configured to give an Allow - Block choice. This is handy as when password protected only the administrator / password setter can answer the call. Anyone who doesn't know the password can only block. Don't know if they block against the same range of executables as AE though.
     
  17. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Thanks for that information about those products.

    ----
    rich
     
  18. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
  19. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    that's very cool thanks again;)
     
  20. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Check whether you have applied restrictions on all files or all files excluding dll's in secpol.msc

    You could add a No execute SRP to RECYCLER and TEMP dirs

    Cheers
     
  21. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    yes .dll extensions were added in gpedit.msc.
    i know about the recycler and the temps,but i should still get that dll deny warning..hmm
     
  22. Mosqu

    Mosqu Registered Member

    Joined:
    Nov 21, 2008
    Posts:
    69
    Location:
    Germany
    I agree. But I like the way Prevx Edge (not a classical HIPS) intervenes the Downadup/Conficker worm, too. It shows a simple and clear alert with an eye-catching red block-button. There is no allow-button, just a unremarkable grey options-button. So everyone should easily hit the right one. :D
     
  23. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
    OA Beta 3.1.0.18,

    execution alert allowed, memory tampering blocked, computer in not infected
     

    Attached Files:

    • 11.gif
      11.gif
      File size:
      23.9 KB
      Views:
      2,045
    • 12.gif
      12.gif
      File size:
      21.3 KB
      Views:
      978
    • 14.gif
      14.gif
      File size:
      21.2 KB
      Views:
      990
    • 15.gif
      15.gif
      File size:
      21.3 KB
      Views:
      978
  24. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Hi, thanks. That,s nice! :thumb:

    Is this a closed beta? Does latest public beta has similar detection?

    Thanks
     
  25. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    @ chris2busy

    Does MD has gives pop ups about memory modification like OA as shwon by alex_s? Thanks
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.