Malwarebytes Anti-Exploit

Discussion in 'other anti-malware software' started by ZeroVulnLabs, Oct 15, 2013.

  1. ropchain

    ropchain Registered Member

    Joined:
    Mar 26, 2015
    Posts:
    335
  2. chrcol

    chrcol Registered Member

    Joined:
    Apr 19, 2006
    Posts:
    982
    Location:
    UK
    how are you guys getting chrome in a appcontainer?
     
  3. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  4. chrcol

    chrcol Registered Member

    Joined:
    Apr 19, 2006
    Posts:
    982
    Location:
    UK
    thanks, trying it out now.

    I suppose my feeling is appcontainer will make it harder to exploit the OS from the browser, but if the dll injection from stuff like HMPA stops working then the flipside is it may become easier to exploit the browser itself.

    Now most processes are appcontainer, one extension crashes but from what I can see the rest (over 15) all are working.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes I know what you mean, but what I meant is that image viewers are more likely to be attacked than other type of apps.
     
  6. chrcol

    chrcol Registered Member

    Joined:
    Apr 19, 2006
    Posts:
    982
    Location:
    UK
    From what I can see HMPA is still functioning on appcontainer processes, not only do I see the dll attached but it also has active cpu usage same as untrusted processes had.
     
  7. Overkill

    Overkill Registered Member

    Joined:
    Mar 16, 2012
    Posts:
    2,343
    Location:
    USA
    I had something weird happen...I installed Shade (similar to sandboxie) and I tried bookmarking a site by dragging it to the bookmarks bar (when I click the star to bookmark MBAE is quiet) forgetting I was in shade's sandbox and MBAE kills chrome and gives me this alert.

    Dragging a bookmark triggers it
    screenshot.1.png
     
  8. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    IMO you shouldn't leave Sandboxie aside. You already know it is best of its own kind. If you are having issues then try a Windows reinstall, from scratch and give it a chance once again. I know it's a major pita but Sandboxie's worth the pain.
     
  9. Overkill

    Overkill Registered Member

    Joined:
    Mar 16, 2012
    Posts:
    2,343
    Location:
    USA
    Hey Mister X, I hope all is well...I am using shade on another PC. I will NEVER stop using sandboxie :)
     
  10. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,807
    Location:
    .
    Ah ok! Good to know. Me too, hope all is well there.
    Good luck running tests with Shade.
     
  11. Overkill

    Overkill Registered Member

    Joined:
    Mar 16, 2012
    Posts:
    2,343
    Location:
    USA
    Waiting on my dang activation key :rolleyes:
     
  12. Overkill

    Overkill Registered Member

    Joined:
    Mar 16, 2012
    Posts:
    2,343
    Location:
    USA
    Another strange trigger/conflict with shade...I burned a movie and when autoplay opens and I click to open the movie in mpc-hc, MBAE gives me this alert...

    screenshot.2.png
     
  13. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    1,935
    Location:
    North of the 38th parallel.
  14. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,006
    https://www.malwarebytes.org/support/releasehistory/

    http://downloads.malwarebytes.org/file/mbae
     
  15. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    I run MBAE Premium & have it set to download updates automatically. It has never done so. Ergo, each & every update must be done manually by me -- when I *happen* to hear of its existence.

    Worse yet, MBAE has NO provision to "check for updates."

    MalwareBytes has never notified me of updates to MBAE. It's not right that I have to consult Wilders in order to be aware of updates. I am a long-time MBAE user/supporter, but this sort of administrative glitch in an otherwise splendid program is making Hitman Alert look increasingly attractive.

    @ anon - Many many thanks for the heads-up. I have updated manually (as usual).
     
    Last edited: Jun 16, 2016
  16. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Bellgamin

    Well I appreciate you sentiment, you might be better served by opening a support tick with Malwarebytes.
     
  17. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    ScreenHunter_15 Jun. 16 16.13.jpg You are not the only one. I don't think they have an update feature. MINE NEVER DOES EITHER
     
  18. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
  19. ky331

    ky331 Registered Member

    Joined:
    Jun 25, 2008
    Posts:
    158
    1) MBAE typically waits about a week before pushing-through a new update. This allows a smaller group of users to "test" what they believe to be a bug-free release. Anyone who wishes to manually download and "play" with it during that first week may do so. After about a week --- if you haven't manually downloaded --- you will then be advised of the new version, and depending on your settings, either have it automatically installed, or await your approval.

    2) The history link given is to MalwareBytes PRODUCTS. Yes, it starts with MBAM... but if you scroll down, you'll see it also includes MBAE.
     
  20. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    AH OLD TIMERS AGAIN
     
  21. ArchiveX

    ArchiveX Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    1,501
    Location:
    .
    Same, here. :thumb:
     
  22. haakon

    haakon Guest

    Don't beat yourself up, old timer.

    It's a stupid design, and not singling out Malwarebytes here, typically "modern" and "mobile friendly" - vast expanses of nothing and the very minimum of detail presented in large fonts. Ooooooh, pretty. And you get to use your scroll wheel! Because if you're not thumb swiping/tapping the Web on a toaster pastry sized vertical screen (looking for info on primarily desktop/laptop apps, no less), you're just not Modern. Got a 1920x1080 monitor? You dinosaur. Why do you think mammals evolved a thumb? ;)

    And is it necessary to list on the same screen 26 items for MBAM releases going back over six years??

    Yeah, that would be a nice feature. And/or an option for a tray notification. Maybe those are on pbust's to-do list.

    Anyhow IMHO, MBAE Premium is the best anti-exploit on the market and I just renewed my license for another year. But having been whacked too many times by automatic updates since some one thought that was a good idea ~20 years ago, if I have an app where it can be disabled, it gets disabled. (As well, that feature is involved when considering a purchase.) Then I just pay extra attention to the news for releases. Even if that means checking in on Wilders. :D
     
    Last edited by a moderator: Jun 17, 2016
  23. BTW I found out about MBAE not being able to inject its DLL in an AppContainer process.

    See Windows Sandbox thread. I will do a recap so you don't have to go through every thing. A new Windows mitigation (win 8.1 and 10) does not allow code injections (ProcessDynamicCodePolicy). This is not a watertight DLL block, because still 2 means of injecting DLL exists (obviously one of them is used by HPMA).

    Chrome will facilitate site-isolation soon (available as experimental switch), Chrome is also nearly ready for Control Flow Guard (link), on top of that it applies all new Windows Mitigations (e.g. ProcessSystemCallDisablePolicy is Win32k lockdown) and facilitates AppContainer, so injecting a DLL (in an AppContainer proces) now is only a marketing gig.

    You can use MBAE happily for Chrome Broker process (Medium IL) with MBAE. I can understand that MBAE representatives are not answering, since you need a lot of info and reading to understand the validity of NOT injecting the AppContainer Chrome processes. In the end you are better of with MBAE (only protecting broker) than HPMA (injecting in every process and increasing the attack surface, hence weakening Chrome's build in protecting against exploits). -------

    Mind you that all exploits Poc attack the Medium IL broker and there is no PoC breaking out of the LOW IL Sandbox (remember my critism of the MRG synthetic tests), so with the new protection mechanisms in place chances of those sandboxed processes being exploited only reduce further.

    EDIT: changed/removed remarks which triggered ErikLoman to respond
     
    Last edited by a moderator: Jun 18, 2016
  24. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    ok I understand now, it has the option to upgrade to newer version but sounds like that don't happen until a week after the release. instead up upgrading from the links here, I will wait to see how long it takes next time ;)
    if you loo at my sig I could be called overkill 2 :D
    as long as I keep quietzone enabled, even if I were to get infected, after reboot all is gone supposedly.
     
  25. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    I'll bring you up to speed...

    A sandbox processes starts as a regular process. But once it has set up it drops its integrity level. If the process would start at eg. untrusted integrity level it would not even be able to load kernel32.dll or setup a channel to the controlling process that manages the sandbox.

    So a sandbox process starts as a regular process and then drops its rights.
    If you inject after it has dropped its rights you are too late as it is prevented by Windows.

    HMPA injects slightly earlier into a process (when the rights have not yet been dropped). You see it as marketing, we see it merely as a technical thing to stay compatible with other security products. If you can see who is injecting you can see who placed a hook in a process; was it a security product or potential malware? That is why we came up with a way to inject earlier: for compatibility. Nothing more, nothing less. Its was added to Alert 2.6 in 2013. Nothing has changed since in terms of the actual injection.

    I agree with you that a security product can increase the attack surface. Everything you add increases attack surface, even video driver DLLs.
    HMPA is compiled with CFG since November 2015 (since Visual Studio added support for it). I wonder how much other security products compile their injected DLLs with it (you can check with ProcessHacker). CFG is only useful if all DLLs in a process have it enabled. If a DLL isn't compiled with CFG it becomes the weakest link. Similar to a DLL that has no ASLR support, it makes the process vulnerable.

    Regarding sandboxes, they aren't bulletproof. They raise the bar, just as anti-exploit, but in a different way. A sandbox weakness is that they have to communicate via a broker to do anything meaningful. Hacking team got around the Chrome sandbox for quite a while until they got exposed.
    http://arstechnica.com/security/201...y-potent-enough-to-infect-actual-chrome-user/

    The fact that no public exploit exists, doesn't mean there is no escape. Isn't this the case for all zero-days?
     
    Last edited: Jun 17, 2016
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.