AppGuard 4.x 32/64 Bit - Releases

Discussion in 'other anti-malware software' started by Jryder54, Oct 29, 2013.

Thread Status:
Not open for further replies.
  1. FleischmannTV

    FleischmannTV Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    1,093
    Location:
    Germany
    @Cutting_Edgetech

    This was about solving the OP's problem and not a general discussion whether the container folder should be added to user space or not. I for one find it beneficial to add it because it can stop malicious dlls from running inside the sandbox. Yet the OP had a problem with programs not working because the dlls could not launch and adding the container folder to user space clearly does not solve this problem.
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,258
    Location:
    .
    Great explanation CE, thanks a lot again. Hopefully Barb_C will read this posts and we'll see what happens? In the meantime I can contact BRN as advised by you.
     
  3. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    Actually his initial question was does it pose a security threat to not add the sandbox folder to the user-space. The following is his initial question from post 2414, "I managed these issues by NOT adding c:\Sandbox folder to User Space. Does this setting pose a security risk?" In my opinion this does pose a security risk, but it could also be considered not having the added protection of AG. Not adding the sandbox folder to the user-space means AG will not block executions in the sandbox such as drive-by-downloads from browsers, and the execution of other malware from other sandboxed applications such as email clients, etc. Unfortunately AG is not adding much protection if the sandbox can not be added to the user-space. The only protection AG is adding in this case is if some malware is able to break out of the sandbox. AG may be able to prevent it from spreading to critical system resources. The 2 options I gave him do work for most other users. I still think problems like these should be reported to BRN. They may be able to use this information to find fixes, or make other changes that would lead to AG being a better product. Maybe Barb will see the post soon, and respond.
     
  4. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    No problem! Sorry I could not find a fix. How long have you been using Sandboxie?
     
  5. FleischmannTV

    FleischmannTV Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    1,093
    Location:
    Germany
    Just to make things clear, I also advise adding the container folder to user-space.

    For one it is a more convenient option then start/run restrictions because it only blocks drive-by downloads and lets system space files launch, whereas start/run restrictions would block these as well unless they're listed as allowed. Further it blocks the launch of malicious dlls, against which start/run restrictions are only of limited use, at least to my understanding, because you can only allow or block rundll32 and the likes, whereas AppGuard makes a distinction from where the dlls are launched.
     
  6. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    5,258
    Location:
    .
    Oh, don't be, sometimes problems are beyond our scope. I've been using SBIE for 1 year only. With basic settings (not advanced settings nor advanced knowledge of it) and AppGuard barely 2 months. Besides I am a n00b in security.
     
  7. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,696
    Location:
    USA
    We all had to start from somewhere. I'm definitely no professional, but I have accumulated a lot of knowledge over the years. I work more with hardware, but I stopped building machines 4 years ago. The technology has already changed so much. It's a constant struggle to keep up with advances in technology.
     
  8. syrinx

    syrinx Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    427
    I was wondering if anyone could double check my most recent find.

    I've found that after setting the protection level to off temporarily then setting it back to locked down or medium results in the 'Guarded Execution' and 'Privacy Mode' menus of the notification tray icon vanishing until a reboot. (While a guarded app is running even if it is launched after protection is rearmed.)

    It's not a huge deal as previously I never saw (and have never had reason to use) these at all as I used runas a limited user in combo with sandboxie 3.76 which also resulted in not showing the menus as expected. I just noticed it now as I have upgraded to sandboxie 4 and started to see the menus appear as they are meant to. They just never return after it is set to off then rearmed.
     
    Last edited: Nov 22, 2014
  9. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Syrinx

    On w 7 x64 here. Just tested and I don't see that behavior

    Pete
     
  10. digmor crusher

    digmor crusher Registered Member

    Joined:
    Jul 6, 2012
    Posts:
    1,277
    Location:
    Canada
    I don't see it either.
     
  11. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    Nor me.
     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    @ pegr

    Has it already been investigated why AG failed to protect against the "hollow process" test? Or perhaps it didn't actually fail?
     
  13. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    I think this is a question that only Blue Ridge Networks can answer.

    As I said previously in the other thread, although MemoryGuard didn't stop the HMPA "hollow process" test when I ran it, I would nonetheless expect the other features in AppGuard to contain the payload from a real attack using the process hollowing technique.
     
  14. stackz

    stackz Registered Member

    Joined:
    Dec 27, 2007
    Posts:
    648
    Location:
    Sydney Australia
    Re ancient technique known as process hollowing:
    AppGuard completely contains any guarded process and child processes.
    AG will allow a guarded parent to spawn a child process and inject into it. Nothing is broken by allowing this as the child process is guarded and therefore completely contained.
    If AppGuard did not allow this, how would a browser be able to open a new tab, or open a link in a new instance of itself?

    AG will not allow any guarded process to inject into the memory space of any process that it is not the parent of.
    No guarded process can write to system space, therefore any malware you throw at AG is completely contained.
     
  15. Barb_C

    Barb_C Developer

    Joined:
    Jan 7, 2011
    Posts:
    1,234
    Location:
    Virginia
    We have confirmed that AppGuard does protect against this attack (at least against the versions of the malware that we've been able to obtain).
     
  16. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    I always thought it would do, but it's good to see it officially confirmed against live malware.
     
  17. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes of course, but it should stop any attack related to code-injection/process manipulation, so that's why I'm checking.

    Actually, I thought that "process hollowing" is a newer technique that's being used nowadays. I also didn't know that code-injection is allowed from parent to child process if it's a guarded app. Then it makes sense that it didn't stop the HMPA test.

    Can you give some more info, what malware was tested against AG, and how was it stopped? To clarify, I was talking about the HMPA testing tool. According to pegr, AG didn't stop it from injecting code into calc.exe.
     
    Last edited: Dec 2, 2014
  18. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    As I said in the other thread, calc.exe was started as a child process of the HMPA testing tool, which I assume is why MemoryGuard didn't stop the code injection. This is the same point that stackz made in his reply above.
     
  19. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I doubt Blueridge would test against a testing tool. They tested against real malware, and Appguard did it's job. QED

    I also suspect if Barb wanted to give the information she already would have.

    Pete
     
  20. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes I saw it, but does it make sense to allow a parent to inject code into a child process? It's a bit confusing to me.

    Actually, I thought that they tested it against the malware that you encountered. Like I said before, I would like to know how AG stopped it, and with what message.
     
  21. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    If they had wanted to disclose that they would have, and your liking to know, especially since you don't use their product makes a weak case to expect them to answer you.
     
  22. AutoCascade

    AutoCascade Registered Member

    Joined:
    Feb 16, 2014
    Posts:
    741
    Location:
    United States
    I've been running AppGuard in lockdown mode. What are the disadvantages to this? Thanks
     
  23. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    @ Peter2150

    Please not this stuff again, the question is directed to the developer, let's see what she got to say. Like I said, I initially thought that you supplied the malware sample to her, but apparently they decided to test some other malware that's using the "process hollowing" technique, so it would be interesting to know how AG blocks it.
     
  24. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Memory Guard would block as it's altering memory of a process
     
  25. jansu

    jansu Registered Member

    Joined:
    Dec 2, 2014
    Posts:
    3
    Hi. I'm just beginning to use AppGuard and I have a few questions
    Gooogle Chrome was set by default:

    http://i.imgur.com/dzsQIET.jpg

    Pages others load, but however, I am disturbed by the entries in the "Activity Report":

    http://i.imgur.com/xo8htbL.jpg

    Whether to ignore it or add something in the settings?
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.