DoubleAgent: Taking Full Control Over Your Antivirus

Discussion in 'other anti-malware software' started by Mr.X, Mar 22, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    As far as those who will state running as a SUA will prevent Application Verifier from running is this tidbit. Also believe this "blows holes" in the running as admin rebuttals:
    https://msdn.microsoft.com/en-us/library/ms220948(v=vs.90).aspx
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    So would running Application Verifier under SUA allow it to make changes to those registry keys with no Admin rights?
     
  3. Jerry666

    Jerry666 Registered Member

    Joined:
    May 28, 2002
    Posts:
    176
    Thanks for the update
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Let's back up a bit.

    Appears Cybellum is not just doing FUD, but is doing much more. For starters, Application Verifier most likely is not even installed on your PC:
    https://msdn.microsoft.com/en-us/library/windows/hardware/ff538115(v=vs.85).aspxhttps://msdn.microsoft.com/en-us/library/windows/hardware/ff538115(v=vs.85).aspx

    I just checked my Win 10 x64 1607 build. Appverif.exe and Appverif.chm do not exist. So either you intentionally installed Windows Software Development Kit or malware downloaded Appverif.exe and Appverif.chm. Let's go with the second scenario.

    Malware fingerprints your system and IDs your SUA info. Hacker then opens up his copy of Appverif.exe and sets up system access rights for the SUA. I am assuming that its possible with Application Verify to grant access rights to a SUA that would be denied under its normal permissions. Malware then downloads and ideally copies the hacked version to System32 directory. Since its a validly signed .exe in a system directory, it will bypass most anti-exec's. The malware also has to download .exe, script, whatever that will run the hacked Appverif.exe. Next malware dropper has create a means to run the payload at next boot time; RunOnce reg. key would be ideal. Finally, the malware dropper has to perform the registry activity noted in reply #51. SUA logons on, hacked Appverif.exe runs hidden, you're nailed. Obviously, other malware infection vectors possible than this one.
     
    Last edited: Mar 24, 2017
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    I doubt that the part I bolded is possible without admin rights. Few AV companies also noted in their response that admin rights are needed to perform those actions. So I still think that without admin rights this couldn't be pulled off. Still great to see vendors released new versions with additional protections :thumb:
     
  6. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I am not too worried. if UAC set to high, Voodoo don't block it Appguard will .
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
  8. Nitty Kutchie

    Nitty Kutchie Registered Member

    Joined:
    Apr 10, 2015
    Posts:
    160
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Not so sure about that.

    Based on the below, Application Verifier can hook a higher privileged process while running in SUA mode. Once a hook is established, you can do anything through it.
    https://blogs.technet.microsoft.com/askperf/2009/05/22/two-minute-drill-application-verifier/

    Also agree that privately notifying software vendors including Microsoft about vulnerabilities is worthless. Just publically disclose it and those are fixed in hours.:rolleyes:
     
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Maybe your router blocks access to that site?
    You can check if IP in Url that you posted it the same as your IP. If so you should probably edit your post and hide it.
     
  11. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Me also! That is, what those "unknown code injection features" are.
     
  12. Nitty Kutchie

    Nitty Kutchie Registered Member

    Joined:
    Apr 10, 2015
    Posts:
    160
  13. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    As I understand it can monitor interaction of apps in SUA mode with OS. It doesn't mean that itself is running in SUA mode. It probably has to run with admin rights to do what it's intended to do.
     
  14. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  15. guest

    guest Guest

    It need admin rights, so if you are in SUA and doesn't allow it in the first place, this malware is just BS for noobs.
     
  16. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    Yes, so far I didn't hear of any tool that would be intentionally allowed to bypass this AUA/SUA security boundary (doing admin stuff with app running under SUA). I also doubt that MS would ever make such security hole.
     
  17. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    In regards to SUA being bypassed, Avast below again notes that is indeed possible and well known. But it appears, people just want to believe that cannot happen:
    http://infosechotspot.com/microsoft...urn-antivirus-software-into-your-worst-enemy/
     
  18. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,447
    Location:
    Slovakia
    Lame excuses by AV companies, just keep popping up. It is interesting to see, how many actually take it like a man and admit a failure by fixing it. :)
     
  19. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    And yet there is nothing in that quote about SUA bypass. As usually user with admin rights can do harm to their computer and AV can help here. Nothing new, really.
    Of course there were (and might still be) exploits that could do that, but not in this case. In this case user needs admin rights.
     
    Last edited: Mar 25, 2017
  20. guest

    guest Guest

    Exact, this is a weak malware, it doesn't even get admin rights by itself, he needs an happy clicker.

    This is the exact type of FUD made and needed by those guys to promote their brand new "next gen" company.
     
  21. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
    I wonder why? What is most striking to me is that AV's (with HIPS) should be blocking modifications to the "Image File Execution" registry keys in the first place. And why are the more popular AV's still not using the Protected Process feature? Both of this would have stopped this attack vector.
     
  22. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,823
    Location:
    .
    Perhaps they don't want to undergo all the process needed for Microsoft accept them as trusted vendors. Mostly $$$, I think.
     
  23. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Eset stated it was "a bear" to get implemented so it isn't just a matter of cost. As such, I suspect getting associated spawned child processes to do the same will be worse. Eset did state they will try to do it but no promises. At least now they have "locked down" the GUI child process via self-protection from the protected parent kernel process to prevent any code or hook injection.
     
  24. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Most don't since any new software installation will generate HIPS alerts when its keys are created there.

    Remember that "Image File Execution" registry keys modification plus many more registry area changes are part of the old Comodo Leak Tests. Defense+ monitors those registry key areas but it also has features such as "Windows Update" and "Trusted Installer" modes that can be switched to that eliminate the HIPS alerts.
     
  25. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    This also will allow access to Image File Execution Options registry keys from user mode and unlike that previously noted, no reboot is required: http://www.geoffchappell.com/studie...ysinfo/image_file_execution_options.htm?tx=48
     
    Last edited: Mar 27, 2017
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.