MemProtect - Support & Discussion

Discussion in 'other anti-malware software' started by WildByDesign, Aug 21, 2016.

  1. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I made sure I have the blank line. No Soap. I know mood is running a very similiar configuration to mine so I don't think it's a conflict. I played making an ini file based on the default one in the install folder. My system didn't like it. BSOD.
     
  2. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Sent an Email to Florian
     
  3. guest

    guest Guest

    There may be a missing blank line..
    Ok, i was too late - it was already mentioned in Post #100 ;)
    Edit:
    There is nothing wrong with the config, but why the BSOD :cautious:
    But now i see you had a similar problem with MemProtect some time ago in the Bouncer-Thread. It seems your system doesn't "like" MemProtect:
    This is my layout too. And in Program Files at least Administrator-rights are needed to modify these files. Much better as extracting it into the user-directory where these files can be modified.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Guy's I appreciate the help. I am going to see what Excubits folks say. this is become a challenge. :)
     
  5. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Getting closer. Heard from Excubits this morning. They are fast. They said the format of my ini was fine, but sent a new one to be sure it was encoded properly. I dropped it in and immediately got a blue screen. Rebooting produced the same results. The mini dump suggested it could be NVT ERP. So I uninstalled it and bingo Memprotect now works.

    So now the BIG question. Is there anyway I can doing anything to work around so it will work with NVT ERP

    Pete
     
  6. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    That is a big question and certainly a legitimate question. Also tricky from a technical standpoint. All of these drivers (NVT ERP included) utilize kernel-mode drivers that intercept API calls deep within the kernel. What makes this even more complicated is that it is very likely that both drivers are intercepting the exact same API call at the exact same time, resulting in some sort of collision/BSOD.

    All of Florian's drivers now include support for kernel debugging which can get the more technical users into the nitty gritty details that might be more helpful.

    From the Readme with each driver:
    Unfortunately that kernel debugging with DbgView is not an area that I am familiar with at all. Florian may likely use that to figure out deeper into the issue.

    I know that NVT ERP has a lot of options, so it is possible that one change of a setting within those options may help with this issue, but that is trial and error and may not help in the end. The safest thing, of course, is to avoid security software which intercepts the same API calls, on the same level, at the same time.

    Which version of NVT ERP were you experiencing this BSOD with? I may actually try to replicate this later today in a virtual machine because I always like to figure out complicated things. I'll let you know later if I'm able to figure out any workarounds or anything useful for this issue.
     
  7. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,804
    Location:
    .
    FWIW, latest ERP version is 3.1_24062015_BUILD1
     
  8. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I am using the latest beta which is attached to his Novirusthanks signature. Yeah the kernel debug stuff is a bit alien to me. What is weird is mood is using it also with no problems.

    Equally strange is when I first got it working the tray icon turn green. Then when I enter Opera it went red. I tried allowing Opera to access Sandboxie. No avail. Rebooted and it's a constant red. Since this is a marginal return at best, I am begging to wonder...
     
  9. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hey all. I am officially abandoning this effort. Thanks to all for your help.

    I just noticed some other strange side effects on my system, and unlike with FIDES, the return on my effort was probably marginal, so time to give it up.

    Again thanks to all.

    Pete
     
  10. 4Shizzle

    4Shizzle Registered Member

    Joined:
    May 27, 2015
    Posts:
    179
    Location:
    Europe
    I thinks you can start DbgView from Sysinternal Tools, this show up Debug Messages. You need to set a filter for MemProtect so not too many alerts in DbgView. I tried some time ago, but for me no benefit, I dont understand much of what I see :)

    @Peter2150: OK, maybe too many drivers to protect system at all. NVT ERP and AppGuard, some others? I thinks if you have AppGuard you are pretty well protected, so I wouldnt install and use MemProtect additionaly. AppGuard is also pretty solid.

    I can only speak for me personal: I try not to mix too many equal tools together. So If I use NVT I dont use AppGuard, If I use Bouncer I dont use NVT etc. I dont know exactly where all this drivers interact and inject in kernel and-or real mode, so this can end up in trouble if they block each other or interference. It is like with using 2 or 3 AVs, this also causes some problems sometimes.
     
  11. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Thanks my friend. I agree. Ironically NVT ERP does fill a couple of Appguard holes for me, especially when I have to turn off Appguard. I can see Bouncer as a replacement for NVT, but the work to set it up. Ouch. Don't see it would gain me much. At least now I know. And if it got me into Fides it was totally worth it.
     
  12. mike83

    mike83 Registered Member

    Joined:
    Mar 9, 2016
    Posts:
    35
    I was thinking (as an example) about protecting explorer.exe in this configuration...

    It is easy for me to understand the reason why chrome is blocked from accessing the memory of explorer.exe. And I can say the same about Office products. I also understand the reason for blocking access to KeePass.exe from other processes

    But why specifically block KeePass.exe from accessing Explorer.exe and at the same time have [DEFAULTALLOW] ?

    I mean, what is the reason for not blocking access to explorer.exe from all processes except some few special processes like Task Manager, AV products etc.?
     
  13. guest

    guest Guest

    @WildByDesign created a config for protecting some vulnerable applications.
    The intention was to only protect these applications and not all others. Therefore [DEFAULTALLOW] was being used
    = all applications can access other applications, except applications in the blacklist.
    And that's the reason why you can see explorer.exe-rules for only these applications.
    4 Protected Apps -- 4 Explorer.exe-rules
     
  14. mike83

    mike83 Registered Member

    Joined:
    Mar 9, 2016
    Posts:
    35
    Thank you for your reply, mood!

    What I did not understand in the configuration, was why prevent only the "protected" processes (e.g. KeePass) from writing to explorer.exe but at the same time allow almost all other processes in the system to write to explorer.exe memory.

    I mean, I was thinking that the idea to make e.g. KeePass.exe a "protected" process was equal to just prevent other processes from writing to KeePass.exe memory (which I find easy to understand).

    So, when using the same logic I'd call preventing other processes from writing to explorer.exe as "making explorer.exe a protected process" - and not "making KeePass.exe a protected process"...

    I'm sorry to still disturb you with this; I'd just like to understand the reasoning behind creating "protected processes" by preventing memory access bidirectionally instead of just preventing the memory access inwards...
     
  15. Referring to the good, the bad and the ugly makes it easy to remember/understand

    Preventing inward memory access (protecting the good).
    This is useful for medium level integrity processes which credentials are misused by exploits and or targeted by malware (e.g. explorer). Protecting programs which handle sensitive information like your password manager, mail and webbrowser (shopping/online banking) are also plausible candidates to protect from the rest of your system.

    Preventing outward memory access (caging the bad)
    For programs running dynamic content (scripts, macro's, plugin) like webbrowser, media player, office programs and pdf-reader. The documents those programs process contain code, so they can be exploited from the inside. Putting them in a container prevents them infecting the rest of your PC and is a relative easy set and forget form of damage control. Programs which interact with those programs should also be put in a (the same) container (e.g. flash or your password manager).

    Preventing bidirectional memory access (isolating the ugly)
    When you apply above rules of thumb your email program, webbrowser and password manager automatically become candidates to isolate from the rest of your system.
     
    Last edited by a moderator: Dec 29, 2016
  16. guest

    guest Guest

    The post above #115 explains it pretty well
     
  17. mike83

    mike83 Registered Member

    Joined:
    Mar 9, 2016
    Posts:
    35
    Thanks for the great parable, Kees! I completely agree with your explanation.

    ...but why do we categorize KeePass.exe as one of "the ugly" instead of "the good", i.e. what is the "bad" in KeePass.exe that must be caged?

    My understanding is that KeePass.exe does not "process documents containing code so that it could be exploited from the inside".... (well, most probably I must be wrong here, which actually seems to be the reason for my confusion originally!).

    To end up with this, could you be so kind as to point what exactly is my "blind spot" here? I mean, what is the data processed by KeePass.exe that contains code and makes it possible for KeePass.exe to be exploited from the inside?
     
  18. Keepass processes sensitive information, so it should be protected (the good).

    When your browser needs access, you also have to cage Keepass, because you want to close all ways out of the browser.Only when this (my_ assumption is true (browser needing access to Keepass), Keepass requires isolation, which required using the log and granular (trial on errror) refinement of the MemProtect rules (ugly).

    So it depends whether browser needs access, when not Keepass is the good, when it requires bidirectional isolation the hassle makes it ugly.
     
  19. zekstein

    zekstein Registered Member

    Joined:
    Jan 8, 2017
    Posts:
    1
    Location:
    Romania
    I have an issue using MemProtect.
    Till today everything worked good but now ..
    The windows says that the driver is not Digitally Signed.
    When i open the cab file, i see some strange chineese characters.
    https://i.stack.imgur.com/UydGn.png
    https://i.stack.imgur.com/UydGn.png

    What to do ?

    Also, on a friend of mine, MemProtect 'lags' the process. We protected a game and everything worked till i day since we started to have 10 fps in the game. Any ideas? Someone bothered with this problems too ?
    https://i.stack.imgur.com/UydGn.png
     
  20. co22

    co22 Registered Member

    Joined:
    Nov 22, 2011
    Posts:
    411
    Location:
    router
    are you installed this update?
     
  21. guest

    guest Guest

    The driver of MemProtect is signed with a SHA2-certificate and the above mentioned update is needed.
    If you don't have the update installed, Windows doesn't recognize signed drivers with a SHA2-certificate as correctly signed.
     
  22. Deckard

    Deckard Registered Member

    Joined:
    Dec 13, 2016
    Posts:
    46
    Location:
    France
    How could we know the efficiency about MemProtect ?
    Someone had done tests; feedback ?

    The default MemProtect.ini is with some lines :
    Code:
    [LETHAL]
    [LOGGING]
    [WHITELIST]
    *>*
    [BLACKLIST]
    *taskmgr.exe>*notepad.exe
    [EOF]
    
    Indeed, I have a log entry when I kill the "notepad.exe" process by the Task Manager but notepad is ... killed
     
  23. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    First you have to define what you mean by efficiency.

    I can't test memprotect, because it chokes on NVT's ERP, and I won't give that up
     
  24. Deckard

    Deckard Registered Member

    Joined:
    Dec 13, 2016
    Posts:
    46
    Location:
    France
    Does the program do what says, namely:
    What's the result on the real-life condition vs malwares ?
    It serves for something or it's a placebo.
     
  25. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I can't say about memprotect, but FIDES/Pumpernickel performs exactly as advertised so I'd suspect the same is true for memprotect. And yes FIDES performs against malware so again I see no reason memprotect wouldn't
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.