VoodooShield/Cyberlock

Discussion in 'other anti-malware software' started by CloneRanger, Dec 7, 2011.

  1. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Clicking Allow and calling it a bypass is a little silly. Still waiting;).
     
  2. mWave

    mWave Guest

    This is a self-protection bypass, not a process monitoring or VoodoAi bypass. Therefore, it doesn't matter if you allow it or not, the point is to bypass the self-protection from user-mode.

    You cannot bypass PsSetCreateProcessNotifyRoutineEx without having existing code execution since the callback will be invoked before the main thread to the process is started (meaning you cannot execute code before your driver's callback is executed). I am not sure what are expecting from me, a zero-day browser exploit to deploy a file-less attack through shell-code execution?

    You are in denial, I see exactly what you're doing here.
     
  3. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    You admitted that your recommendations could be bypassed.
    But how is your code going to run if VS blocks it? You have to click Allow. Once you click Allow, it is not a bypass.

    You admitted that your recommendations could be bypassed.

    What am I "doing here"?
     
  4. VecchioScarpone

    VecchioScarpone Registered Member

    Joined:
    Aug 29, 2015
    Posts:
    343
    Location:
    Down Under the Southern Cross
    Yes, sent logs to Dan last night he spotted the culprit and working on it right now.
    Some process is blocking VS to execute on my computer.
     
  5. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I just PM'd this to Dan and he suggested I post it.

    Frankly this has become much todo about nothing. Lets see what I'd have to do if this was in the wild.

    1. Probably open an email and be dumb enough to download an attachment
    2 Open see the excel spreadsheet and be dumb enough to allow Macros.

    That's pretty dumb right there but with a bit of extra protection it's a non issue.

    Appguard would block it from modifying anything in the system area.
    HMPA would shut down the macro in a heartbeat.

    May be use the other self protections.

    mWave I saw your instructions on how to get the POC to work, but why not just pull the plug. It's just as realistic a test and easier.
     
  6. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Sure, if he can run his bypass from a macro. I am talking about executables.
     
  7. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I am able to stop the voodoo service and exe in task manager and my computer does not lock up. What are you guys doing different to lock it up?
     
  8. imuade

    imuade Registered Member

    Joined:
    Aug 4, 2016
    Posts:
    751
    Location:
    Italy
    if you click allow on VS popup, that's not a bypass.
    buf if you enable a macro and the malware acts, that's definitely a bypass

    check this https://www.youtube.com/watch?v=KSbRWmpSUwo
     
  9. mWave

    mWave Guest

    What are you talking about now? My recommendations would be to register ObRegisterCallbacks, which would be most effective for protecting VoodooShieldService.exe as opposed to the GUI, but it can do both to an extent. If ObRegisterCallbacks is implemented correctly then you won't have to worry about user-mode code bypassing the protection too much, because opening a handle to the process or the process' threads would be blocked (Access Denied). Of course there are tricks here and there which might work from user-mode, you can patch these too. It's light-work.

    That being said, nothing is 100% full-proof. You can bypass Kaspersky from kernel-mode, but from user-mode? Good luck with that, they pretty much patched everything up. That's an example of where you could be.

    Your logic makes no sense. I will repeat myself once again, this is not a bypass for process monitoring or VoodoAi, this is a self-protection bypass. I assume you can efficiently understand English? My code will not run if VS blocks it, but once the code is running the bypass takes place.

    Let me quote what I said previously:
    I do not even get paid minimum wage, I'm not going to re-write my code in a completely different language. My code is written in C++, of course if you want to re-create it using the same method for use within a Macro then you can feel free to do this with your own time. It'll still work.

    Here is a demonstration video of the SELF-PROTECTION bypass (yes that is right, not a process monitoring or VoodoAi bypass):
    https://www.youtube.com/watch?v=OFbLk8zmmw0&feature=youtu.be

    According to someone who has notified me, VoodoShield should not re-alert for the same app after white-listing. Which is strange because I may have experienced a bug on the previous installation during some testing where it kept on re-notifying for the same program... My bad.

    Anyway, the sample download is in the description, feel free to test it yourself if you do not believe it works due to this mistake. It will work regardless.

    The self-protection has been bypassed from user-mode, you may be in denial with tears down your face but the video evidence is all there. And before you say, "Oh it's not deployed in a macro! You allowed it" - yes, for the final time, it's a self-protection bypass... Not a bypass for the process monitoring or VoodoAi.
     
  10. mWave

    mWave Guest

    It's not a bypass for the process monitoring or VoodoAi, it's for the self protection. If you want to replicate the sample based in VBA (or anyone else) then feel free to do that. I do not get paid, I am just reporting my findings. So I am not spending my time doing this.

    Here is the method, is incredibly straight forward:
    1. OpenSCManager
    2. OpenService
    3. ControlService
    4. DeleteService
    5. CloseServiceHandle

    ^^ Win32 API, very basic and straight forward.

    The lock-down will be triggered if you terminate it via e.g. TaskMgr.exe... You use my method and currently no lock-down is triggered, but there is no protection.

    Bear in mind the video above I did make a mistake (I was rushing), but if you test the sample from the download link in a VM you'll see it works. Even if you don't test the sample, you can see in the video after restarting that it throws an error and demands reinstallation.

    Now move this to a macro (VBA) instead of being done in C++ (which is what I am comfortable with using) and it'll be a "bypass" in the eyes of the developer. I guess.
     
  11. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Can you even P/Invoke in macros? I highly, highly doubt that you can, so your argument does not hold water.
     
  12. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Let me guess, you clicked Allow too.

    Guess what happens when you Allow VS's uninstaller? It uninstalls VS.
     
  13. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    mWave

    you are a very fast typist. You really need to use cool music like cruelsister uses. If your POC works against Voodoo it should also work against Appguard?

    When you say you are not getting paid. Does that mean by Dan? We all know there are bug hunters that do get paid that frequent this forum. Won't mention any names. It sounds like other than the protection Dan is looking at, you otherwise like Voodoo? I been using computers for a lot of years and still hunt and peck.
     
  14. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I couldn't even get to work. And the whole thing breaks down, because you need to do two very stupid things.
     
  15. mWave

    mWave Guest

    Declare PtrSafe Function ControlService Lib "advapi32" Alias "ControlService" (....)....

    Fill in the gaps, do it for DeleteService and OpenSCManager.

    I never use VBA so I do not know myself, I am just guessing. But if people can download files via URLDownloadToFile which is exported by urlmon.dll then I am sure you can use functions exported by advapi32.dll as well (well sechost.dll actually but people use Advapi32.dll for the service functions anyway)... If I get the time then I might experiment and try convert it to an VBA version. But since it's your own project, feel free to try yourself

    I am not a staff member at VoodooShield who is being paid so I don't see why I am expected to make everything perfect for him. I created a method which works and demonstrated it. What he wants to do is up to him... Doesn't change anything for me really. I actually like VoodooShield, I've only just started experimenting with it and whether it has good self protection or not I might use it temporarily myself. I don't dislike it.
     
  16. mWave

    mWave Guest

    What do you mean the whole thing breaks down? Or you are just trying to joke because you don't want to allow it, because it's a "self protection" bypass and not a process monitoring/VoodooAi bypass? hmm
     
  17. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    It's not real life. How would it get on my pc, I have to download it. I have to uncheck macros. I do agree with you Dan should do it so it just protects the processes.
     
  18. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    Actually Dan several of the programs I have if I don't turn off the selfprotection, I can click allow on the uninstall and they fail.
     
  19. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Ok, here is a better analogy... Guess what happens when you Allow malware? The machine will become infected.

    Ultimately we will probably go with ObRegisterCallbacks, but I did not like the idea of implementing a watch dog process as a backup self-protection mechanism... I think it would be much better to lock up the system if this fails. But in order to see if it even works, we had to try it first.
     
  20. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    Dan Appguard locks the system down just like you do. I don't know what they use but the principal is the same. I hate to see more stress added to your life but in one way or another, I for one am sure you will get it right.
     
  21. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Dan I can say from first hand experience the lock up the system can be painful. I still question why the self protection is that big a deal. You are already infected. That's what is needed to be stopped.
     
  22. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Boredog.

    I've tested and I can't see where that has happened. So I stand by I have nothing that locks up the system.

    Pete
     
  23. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    Peter I am guessing you did not look at Lockdowns latest posts. appguard does lock down the system and I have seen it. He says it does lock down the sys and a hard shut down is needed.
     
  24. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Yeah he wasn't talking. But Mister X and I saw something different. But in any case relative to the issue here, there is nothing you can do with the GUI pop ups that will cause that. That is the key issue here.
     
  25. VoodooShield

    VoodooShield Registered Member

    Joined:
    Dec 9, 2011
    Posts:
    5,881
    Location:
    United States
    Thank you for pointing that out ;). The only difference in my method is that the user is asked to reboot the system when they are able to do so... this is so the gui can reconnect to the service properly, without the risk of a bypass. Rebooting will also close whatever web app with a malicious link / driveby that put the user in danger in the first place.

    We just started on this feature 9 days ago... it is not going to be perfect immediately... this stuff takes time.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.