Very interesting fileless malware testing

Discussion in 'other anti-malware software' started by aigle, Dec 24, 2014.

  1. 142395

    142395 Guest

    I also appreciate your effort. I couldn't test such wide range of product by myself, and you even requested new samples to kafeine while you yourself being busy.;)
    I'm going to go to trip and maybe won't drop in Wilders during that, but looking forward to see the results.
    If possible, can you test some major AV not for HIPS or sandbox? Maybe, well, if it blocked exploit in the first stage, note down this and next allow/whitelist it, then if it detects the malware by signature, same, and finally if BB blocks it...though I suppose most AV won't monitor behavior of what is whitelisted... and I'm not sure what should be whitelisted in fileless infection...:confused: But it will take quite the time & effort, so only if you can.
     
  2. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    I had before tried only Avast IS. It's web shield blocked the URL. After that nothing more. If I disable web shield, Avast is happy to stay with malware. Probably no more AV testing as it needs a lot of time to download and install, then update and finally getting no detectíon.
     
  3. 142395

    142395 Guest

    No problem, I can understand it.
     
  4. bugmenot2

    bugmenot2 Registered Member

    Joined:
    Aug 21, 2012
    Posts:
    5
    Location:
    States
    If something is adding a fileless, script-based autostart to the registry, I’d like to be informed of that, regardless of the sequence of events giving rise to such occurrence.

    Can anyone tell me: Does WinPatrol, a free 'HIPS' with reg protection, alert on Poweliks and similar fileless persistent malware?

    And if WinPatrol doesn’t give such alerts, what if anything can be added on Registry Monitoring tab of WinPatrol Plus in order to give such alerts?
     
  5. Plain old fashioned hardening with ACL (denying changes on user autoruns) also adds a threshold, same with denying access to shell/scripting through registry or default program changes.
     
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    I agree. I removed some rights on key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run for my username (Set value, Create subkey...) but left them for usergroup Administrators. I also entirely removed Users group rights. Now if program wants to write to that registry key it has to get elevation approved through UAC prompt.
     
  7. Yep Works great. All my trusted upde processes run elevated so no problems or functionality restrictions
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.