CN106022100A - Method and device for intercepting installation of malicious program and electronic equipment - Google Patents

Method and device for intercepting installation of malicious program and electronic equipment Download PDF

Info

Publication number
CN106022100A
CN106022100A CN201610327338.7A CN201610327338A CN106022100A CN 106022100 A CN106022100 A CN 106022100A CN 201610327338 A CN201610327338 A CN 201610327338A CN 106022100 A CN106022100 A CN 106022100A
Authority
CN
China
Prior art keywords
file
registry entry
program
directory
created
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610327338.7A
Other languages
Chinese (zh)
Inventor
李文靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Baoqu Technology Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201610327338.7A priority Critical patent/CN106022100A/en
Publication of CN106022100A publication Critical patent/CN106022100A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a method and a device for intercepting installation of a malicious program and electronic equipment, relates to the technical field of computer security, and solves the problem that the interception of the malicious program in the prior art is incomplete by preventing the malicious program from creating a directory and/or a registry entry. The method comprises the following steps: monitoring event information of a directory and/or registry key to be created by a program installation process in a system; wherein, the event message comprises a directory path and/or a registry key to be created; judging whether the directory path and/or the registry key to be created are recorded in a preset configurable file; and if the directory path and/or the registry key to be created are recorded in the configurable file, preventing the program installation process from creating the directory and/or the registry key. The invention is suitable for preventing the installation of the malicious program.

Description

A kind of method, device and electronic equipment intercepting rogue program installation
Technical field
The present invention relates to computer security technique field, particularly relate to a kind of intercept rogue program install method, Device and electronic equipment.
Background technology
Along with Internet technology develops, amount of software also increases in magnanimity, and user is loaded in down The software installed on computer, although some is regular software, but regular software is also possible to promote to be installed Some rogue programs, if rogue program is installed on the user computer, consequence is immeasurable, therefore, Rogue program therein stop it to install in needing to identify when installing software.
Existing rogue program intercepts scheme, is to do hooking function process creation software when to do malice journey The interception that sequence process is run, principle is that the installation kit title according to rogue program intercepts, but, if Rogue program installation kit arbitrarily changes a title, just cannot realize the installation to rogue program and intercept.Although it is existing Scheme can configure the installation kit title of rogue program needing to intercept, but the installation kit name that can configure Claiming also is known limited fixed name, still cannot intercept the rogue program that installation kit title is random, because of This, can there is easily leakage and block rogue program in existing rogue program interception scheme, intercept incomplete problem.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of and intercepts method, device and the electronics that rogue program is installed Equipment, the installation to rogue program intercepts more comprehensively effectively.
First aspect, the embodiment of the present invention provides a kind of and intercepts the method that rogue program is installed, including:
Monitoring system Program erection schedule will create directory and/or the event message of registry entry;Wherein, Described event message includes directory path to be created and/or registry entry;
Judge in the configurable file pre-set, if record has described directory path to be created and/or note Volume list item;Wherein, configurable file record has directory path and/or the registry entry stoping establishment;
If record has described directory path to be created and/or registry entry in described configurable file, then stop Described program erection schedule creaties directory and/or registry entry.
In conjunction with first aspect, in the first embodiment of first aspect, described system is Windows behaviour Make system;
Before the event message that described monitoring system Program erection schedule will create directory, described method is also Including: pre-set the file system filter driver journey of the file system binding described Windows operating system Sequence, described file system filter driver is used for driving File Open routine;
The event message that described monitoring system Program erection schedule will create directory, including: by described The event that the described system Program erection schedule of file system filter driver monitoring will create directory disappears Breath.
In conjunction with the first embodiment of first aspect, in the second embodiment of first aspect, described Judge in the configurable file pre-set, if record has described directory path to be created, including:
Read all preventions of record in the configurable file pre-set by described File Open routine to create Directory path and be saved in the first chained list;Each node data of described first chained list is configurable file The directory path that one prevention of middle record creates;
Judge that the node data in described first chained list is the most identical with described directory path to be created successively, If described first chained list existing the node data identical with described directory path to be created, it is determined that described In configurable file, record has described directory path to be created, otherwise, it is determined that in described configurable file Do not record described directory path to be created.
In conjunction with the second embodiment of first aspect, in the third embodiment of first aspect, described Described program erection schedule is stoped to create directory, including:
Described file system filter driver calls the function IoCompleteRequest that completes of IRP and terminates institute State File Open routine, and return to the file system of Windows operating system.
In conjunction with first aspect, in the 4th kind of embodiment of first aspect, described system is Windows behaviour Make system;
Described monitoring system Program erection schedule will create directory and/or registry entry event message it Before, described method also includes: pre-set hook for arranging and the function of edit the registry key assignments The Hook Function of NtSetvalueKey;
Described monitoring system Program erection schedule will create the event message of registry entry, including: pass through Described Hook Function monitors described system Program erection schedule will create the event message of registry entry.
In conjunction with the 4th kind of embodiment of first aspect, in the 5th kind of embodiment of first aspect, described Judge in the configurable file pre-set, if record has described registry entry to be created, including:
The note that in the configurable file pre-set, all preventions of record create is read by described Hook Function Volume list item is also saved in the second chained list;Each node data of described second chained list is for remembering in configurable file The registry entry that one prevention of record creates;
Judge that the node data in described second chained list is the most identical with described registry entry to be created successively, If described second chained list existing the node data identical with described registry entry to be created, it is determined that described In configurable file, record has described registry entry to be created, otherwise, it is determined that in described configurable file Do not record described registry entry to be created.
In conjunction with the 5th kind of embodiment of first aspect, in the 6th kind of embodiment of first aspect, described Described program erection schedule is stoped to create registry entry, including:
Stop performing the original NtSetvalueKey function in Windows operating system.
The first embodiment or the second embodiment of first aspect in conjunction with first aspect or first aspect Or the third embodiment of first aspect or the 4th kind of embodiment or the 5th of first aspect the of first aspect Plant embodiment or the 6th kind of embodiment of first aspect, in the 7th kind of embodiment of first aspect, Will create directory and/or before the event message of registry entry in described monitoring system Program erection schedule, Also include:
The directory path of statistics known malicious program creation and/or registry entry;
Described configurable file is write according to the data counted on.
Second aspect, the embodiment of the present invention provides a kind of and intercepts the device that rogue program is installed, including:
Monitoring module, will create directory and/or the thing of registry entry for monitoring system Program erection schedule Described event message is also sent to judge module by part message;Wherein, described event message includes to be created Directory path and/or registry entry;
Judge module, for judging in the configurable file pre-set, if record has the described thing received Directory path to be created in part message and/or registry entry, record in judging described configurable file When having described directory path to be created and/or registry entry, send to blocking module and intercept instruction;Wherein, Configurable file record has directory path and/or the registry entry stoping establishment;
Blocking module, for according to receive interception instruction, stop described program erection schedule create directory and/ Or registry entry.
In conjunction with second aspect, in the first embodiment of second aspect, described monitoring module includes:
Catalogue monitoring submodule, for pre-setting the literary composition of the file system binding with Windows operating system Part system filter driver also stores, and described file system filter driver is used for driving File Open example Journey;Described catalogue monitoring submodule is additionally operable to by described file system filter driver monitoring Windows The event message that operating system Program erection schedule will create directory, and described system Program is installed The event message that process will create directory is sent to described judge module.
In conjunction with the first embodiment of second aspect, in the second embodiment of second aspect, described Judge module includes:
First chained list generates submodule, configurable for pre-set by the reading of described File Open routine The directory path that in file, all preventions of record create, generates the first chained list and preserves;Described first chained list The directory path that creates of one that each node data is record in configurable file prevention;
First judges submodule, for receiving the thing that described system Program erection schedule will create directory During part message, judge that the node data that described first chained list generates in the first chained list that submodule preserves is successively In no and described event message, the directory path to be created of record is identical, if described first chained list exists with The node data that described directory path to be created is identical, then send to described blocking module and intercept instruction.
In conjunction with the second embodiment of second aspect, in the third embodiment of second aspect, described Blocking module is according to the interception instruction received, by the described file system arranged in described catalogue monitoring submodule System filter drive program calls the function IoCompleteRequest that completes of IRP and terminates described File Open example Journey, and return to the file system of Windows operating system, to stop described program erection schedule to create mesh Record.
In conjunction with second aspect, in the 4th kind of embodiment of second aspect, described monitoring module includes:
Registry monitoring submodule, is used for pre-setting in Windows operating system and links up with for arranging and repairing Change the Hook Function of the function NtSetvalueKey function of registration table key assignments and store, described registry monitoring submodule Block is additionally operable to create note by described Hook Function monitoring Windows operating system Program erection schedule The event message of volume list item, and the event that described system Program erection schedule will create registry entry is disappeared Breath is sent to described judge module.
In conjunction with the 4th kind of embodiment of second aspect, in the 5th kind of embodiment of second aspect, described Judge module includes:
Second chained list generates submodule, for being read the configurable file pre-set by described Hook Function The registry entry that all preventions of middle record create, generates the second chained list and preserves;Described second chained list every Individual node data is the registry entry that in configurable file, a prevention of record creates;
Second judges submodule, for creating registry entry receiving described system Program erection schedule Event message time, judge successively described second chained list generate submodule preserve the second chained list in nodes Identical, if described second chained list is deposited with the registry entry to be created of record in described event message according to whether At the node data identical with described registry entry to be created, then send to described blocking module and intercept instruction.
In conjunction with the 5th kind of embodiment of second aspect, in the 6th kind of embodiment of second aspect, described Blocking module is according to the interception instruction received, original by stop performing in Windows operating system NtSetvalueKey function, to stop described program erection schedule to create registry entry.
The first embodiment or the second embodiment of second aspect in conjunction with second aspect or second aspect Or the 5th kind of embodiment of the third aspect or the 4th kind of embodiment or the 5th of second aspect the of second aspect Plant embodiment or the 6th kind of embodiment of second aspect, in the 7th kind of embodiment of second aspect, The device that described interception rogue program is installed also includes:
Configurable file generating module, for directory path and/or the note of statistics known malicious program creation in advance Volume list item, can configure file according to the data genaration counted on and stores.
The third aspect, the present invention provides a kind of electronic equipment, and described electronic equipment includes: housing, processor, Memorizer, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processes Device and memorizer are arranged on circuit boards;Power circuit, is used for each circuit for described electronic equipment or device Part is powered;Memorizer is used for storing executable program code;Processor can by store in reading memorizer Perform program code and run the program corresponding with executable program code, be used for performing aforementioned arbitrary embodiment party The method intercepting rogue program installation described in formula.
A kind of interception rogue program installation method, device and the electronic equipment that the embodiment of the present invention provides, passes through Stop rogue program to create directory and/or registry entry, solve interception rogue program in prior art the most comprehensive Problem.Meanwhile, intercept catalogue and registry entry can be the most perfect, reach the purpose maintained easily.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet that the present invention intercepts the embodiment of the method one that rogue program is installed;
Fig. 2 is the schematic flow sheet that the present invention intercepts the embodiment of the method two that rogue program is installed;
Fig. 3 is the schematic flow sheet that the present invention intercepts the embodiment of the method three that rogue program is installed;
Fig. 4 is the structural representation that the present invention intercepts the device embodiment one that rogue program is installed;
Fig. 5 is the structural representation that the present invention intercepts the device embodiment two that rogue program is installed;
Fig. 6 is the structural representation that the present invention intercepts the device embodiment three that rogue program is installed;
Fig. 7 is the structural representation that the present invention intercepts the device embodiment four that rogue program is installed;
Fig. 8 is the structural representation of one embodiment of electronic equipment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiment of the present invention one is intercepted rogue program mount scheme to be described in detail.
It will be appreciated that described embodiment be only the present invention a part of embodiment rather than whole realities Execute example.Based on the embodiment in the present invention, those of ordinary skill in the art are not before making creative work Put all other embodiments obtained, broadly fall into the scope of protection of the invention.
Fig. 1 is the schematic flow sheet that the present invention intercepts rogue program installation method embodiment one, as it is shown in figure 1, The method of the present embodiment may include that
Step 101, monitoring system Program erection schedule will create directory and/or the event of registry entry disappears Breath;Wherein, event message includes directory path to be created and/or registry entry.
In the present embodiment, rogue program when mounted, will create specific catalogue and/or registry entry, due to Rogue program almost cannot be accomplished stochastic transformation installation directory and install registry entry, therefore by system intermediate range Sequence erection schedule creaties directory and/or the monitoring of registry entry event, and monitoring creaties directory and/or registry entry letter Breath, if the particular category path that described catalogue and/or registry entry are rogue program to be created and/or registry entry, Then stop described program erection schedule to create directory and/or registry entry, thus realize rogue program installation Comprehensive interception.
In the configurable file that step 102, judgement pre-set, if record has in current event message to be waited to create The directory path built and/or registry entry, be then to perform step 103, otherwise perform step 104;Wherein, may be used Configuration file record has directory path and/or the registry entry stoping establishment.
In the present embodiment, the form of configurable file such as can be such that
<item type=" 1 ", path=" C: dsak "/>
<item type=" 2 ", reg=" and HKEY_LOCAL_MACHINE SOFTWARE ahxki "/>
Type=1 represent be configuration be catalogue, path be rogue program create directory path;
Type=2 represent be configuration be registry entry, reg be create rogue program be create registry entry;
One<item>is one and intercepts item, and this configurable file can constantly improve increase, facilitate follow-up doing more Many rogue programs intercept.
Step 103, prevention program erection schedule create directory and/or registry entry.
In the present embodiment, by stoping program erection schedule to create directory and/or registry entry, reach to intercept and dislike The purpose that meaning program is installed.
Step 104, permission program erection schedule create directory and/or registry entry.
In the present embodiment, by stoping rogue program to create directory and/or registry entry, solve existing interception and dislike The incomplete problem of meaning program.Meanwhile, intercept catalogue and/or registry entry can be the most perfect, reach conveniently to tie up The purpose protected.
Fig. 2 is the schematic flow sheet that the present invention intercepts rogue program installation method embodiment two, and the present embodiment carries The method of confession is applicable to Windows operating system, as in figure 2 it is shown, the method for the present embodiment may include that
Step 201, the file system filter of the file system pre-setting binding Windows operating system are driven Dynamic program, this document system filter driver is used for driving File Open routine.
In the present embodiment, by pre-setting the file system of the file system of binding Windows operating system Filter drive program, can call, in system erection schedule, create directory CreateFile function creation file or mesh During record, receive I/O request bag (IRP:I/O Request Package) of IRP-MJ-CREAT, wherein When upper level applications communicates with underlying file systems filter drive program, application program can send I/O request, This request is converted into corresponding IRP data structure by operating system.File system filter driver receives After IRP-MJ-CREAT, it will pass to self-defining routine function IrpCreate process.
Step 202, mesh will be created by file system filter driver monitoring system Program erection schedule The event message of record.
In the present embodiment, owing to the directory creating of rogue program also can go to IrpCreate routine function, because of This, can drive monitoring system Program erection schedule will create mesh by file system filter driver The event message of record.
Step 203, read all preventions of record in the configurable file that pre-sets by File Open routine Create directory path and be saved in the first chained list;Wherein, each node data of the first chained list is for joining Put the directory path that a prevention of record in file creates.
In the present embodiment, when the form that configurableization file provides for embodiment one, in IrpCreate routine In function, read all data (likely having the data of multiple item) of configurableization file acquisition Type=1, Data are saved in first chained list.
Step 204, judge that the node data in the first chained list is the most identical with directory path to be created successively, If the first chained list exists the node data identical with directory path to be created, it is determined that in configurable file Record has directory path to be created and performs step 205, otherwise, it is determined that does not records in configurable file and treats The directory path created, and perform step 206.
In the present embodiment, from the parameter of IrpCreate routine function, get directory path the most to be created, Mate the path in directory path whether with the first chained list node to be created identical, identical think to be created Catalogue is to need to intercept.
What step 205, file system filter driver called IRP completes function IoCompleteRequest Ends file opens routine, and returns to the file system of Windows operating system.
In the present embodiment, file system filter driver calls function IoCompleteRequest and completes IrpCreate function routine, and return to the file system of Windows operating system;So Wndows grasps Make the file system of system to learn that directory creating is the most treated and complete, would not be toward write;So mesh Record creates and substantially will have ceased, and have failed.Preferably, intercept any installation kit to more preferably show, Intercept is any rogue program, can be by calling the ident value function obtaining current operation process PsGetCurrentProcessId and query procedure information function ZwQueryInformationProcess gets and works as The process name of front installation, is i.e. rogue program installation kit process name.
Step 206, permission program erection schedule create directory.
In the present embodiment, by stoping rogue program to create directory, solve existing interception rogue program the most comprehensive Problem.Meanwhile, intercepting catalogue can be the most perfect, reaches the purpose maintained easily.
Fig. 3 is the schematic flow sheet that the present invention intercepts rogue program installation method embodiment three, and the present embodiment carries The method of confession is applicable to Windows operating system, as it is shown on figure 3, the method for the present embodiment may include that
Step 301, pre-set hook for arrange and the function NtSetvalueKey of edit the registry key assignments Hook Function.
In the present embodiment, due to the establishment of registry entry in Windows operating system, it is carried out kernel letter Number NtSetvalueKey, so hook kernel function NtSetvalueKey can realize the establishment of registry entry Intercept;Wherein, hook method is for finding system service descriptor table (SSDT:System Services Descriptor Table) NtSetvalueKey function, preserve original NtSetvalueKey function address, fixed One NewNtSetvalueKey function of justice replaces original NtSetvalueKey function address, it is achieved that The hook of NewNtSetvalueKey function, Hook Function is NewNtSetvalueKey.
Step 302, the event of registry entry will be created by Hook Function monitoring system Program erection schedule Message.
In the present embodiment, owing to Hook Function has linked up with NtSetvalueKey kernel function, therefore pacify in program When putting into journey registry entry to be created, Hook Function can monitor this event message.
Step 303, read all preventions of record in the configurable file that pre-sets by Hook Function and create Registry entry and be saved in the second chained list;Wherein, each node data of the second chained list is configurable literary composition The registry entry that in part, a prevention of record creates.
In the present embodiment, read configurableization file, such as, when configurableization file provides for embodiment one Form time, obtain Type=2 all data (likely having the data of multiple item), will obtain number According to being saved in second chained list.
Step 304, judge that the node data in the second chained list is the most identical with registry entry to be created successively, If the second chained list exists the node data identical with registry entry to be created, it is determined that in configurable file Record has registry entry to be created and performs step 305, otherwise, it is determined that does not records in configurable file and treats Create registry entry and perform step 306.
In this embodiment, from the parameter of NewNtSetvalueKey, get registry entry to be created, Mate the reg in registry entry whether with the second chained list node to be created identical, identical, think to be created Registry entry is to need to intercept.
Step 305, the NtSetvalueKey function stopped in execution Windows operating system.
In this embodiment, NewNtSetvalueKey function exits, and does not perform NtSetvalueKey function, Rogue program creates registry entry will be failed.It addition, intercepted what installation kit to more preferably show, it is What rogue program, equally can by call kernel function PsGetCurrentProcessId and ZwQueryInformationProcess gets the process name being currently installed on, and is i.e. rogue program installation kit process Name.
Step 306, the NtSetvalueKey function performed in Windows operating system.
In the present embodiment, in the case of normally need not intercept establishment registry entry, continue to call execution NtSetvalueKey function, creating registry entry will be successful.
In the present embodiment, by stoping rogue program to create registry entry, solve existing interception rogue program not Comprehensively problem.Meanwhile, intercepting catalogue can be the most perfect, reaches the purpose maintained easily.
Preferably, in Fig. 1~Fig. 3 in the technical scheme of embodiment of the method shown in any one, in described monitoring system System Program erection schedule will create directory and/or before the event message of registry entry, also include: statistics The directory path of known malicious program creation and/or registry entry;Write according to the data counted on and described can join Put file.
In the present embodiment, the Data Source of configurableization file, is through the long-term statistics of Prevention-Security software Analyzing, createing directory of the rogue program obtained, or registry entry, as long as so have matched these catalogues Or registration table creates, and is i.e. regarded as rogue program and is createing directory and registry entry, because the most any Normal software can create these catalogues and registry entry.
Intercepting, corresponding to what the embodiment of the present invention provided, the method that rogue program is installed, the embodiment of the present invention also carries Supply to intercept the device that rogue program is installed.
Fig. 4 is the structural representation that the present invention intercepts the device embodiment one that rogue program is installed, such as Fig. 4 institute Showing, the device that the present embodiment one provides may include that monitoring module 11, judge module 12 and blocking module 13;
Monitoring module 11, will create directory for monitoring system Program erection schedule and/or registry entry Described event message is also sent to judge module 12 by event message;Wherein, event message includes to be created Directory path and/or registry entry;
Judge module 12, for judging in the configurable file pre-set, if record has the event received Directory path to be created in message and/or registry entry, in judging configurable file, record needs to be created When the directory path built and/or registry entry, send to blocking module and intercept instruction;Wherein, configurable file Record has directory path and/or the registry entry stoping establishment;
Blocking module 13, for according to receive interception instruction, stop program erection schedule create directory and/or Registry entry.
The device of the present embodiment one, may be used for performing the technical scheme of embodiment of the method shown in Fig. 1, in fact Existing principle is similar with technique effect, and here is omitted.
Fig. 5 is the structural representation that the present invention intercepts the device embodiment two that rogue program is installed, such as Fig. 5 institute Showing, on the basis of embodiment illustrated in fig. 4, monitoring module 11 includes: catalogue monitoring submodule 111, uses In pre-setting the file system filter driver of the binding of the file system with Windows operating system and depositing Storage, described file system filter driver is used for driving File Open routine;Catalogue monitoring submodule 111 It is additionally operable to receive Windows operating system Program erection schedule by File Open routine will create directory Event message, and be sent to judge mould by the event message that system Program erection schedule will create directory Block 12.
Judge module 12 includes that the first chained list generates submodule 21 and first and judges submodule 22;Wherein, One chained list generates submodule 21, remembers for being read in the configurable file pre-set by File Open routine The directory path that all preventions of record create, generates the first chained list and preserves;Wherein, the first chained list is each Node data is the directory path that in configurable file, a prevention of record creates;First judges submodule 22, For when receiving the event message that system Program erection schedule will create directory, judging the first chain successively Table generate the node data in the first chained list that submodule preserves whether with record to be created in event message Directory path is identical, if the first chained list exists the node data identical with directory path to be created, then to Blocking module 13 sends and intercepts instruction.
Blocking module 13 is according to the interception instruction received, described in arranging in catalogue monitoring submodule 111 File system filter driver calls IoCompleteRequest function ends file and opens routine, to stop Program erection schedule creaties directory.
The device of the present embodiment two, may be used for performing the technical scheme of embodiment of the method shown in Fig. 2, in fact Existing principle is similar with technique effect, and here is omitted.
Fig. 6 is the structural representation that the present invention intercepts the device embodiment three that rogue program is installed, such as Fig. 6 institute Showing, on the basis of embodiment illustrated in fig. 4, monitoring module 11 includes: registry monitoring submodule 112, For pre-setting the Hook Function linking up with NtSetvalueKey function in Windows operating system and storing, Registry monitoring submodule 112 is additionally operable to be installed by Hook Function monitoring Windows operating system Program Process will create the event message of registry entry, and system Program erection schedule will be created registration table The event message of item is sent to judge module 12.
Judge module 12 includes that the second chained list generates submodule 31 and second and judges submodule 32;Wherein, Two chained lists generate submodule 31, for reading record in the configurable file pre-set by Hook Function All registry entries stoping establishment, generate the second chained list and preserve;Wherein, each node of the second chained list Data are the registry entry that in configurable file, a prevention of record creates;Second judges submodule 32, uses In when receiving the event message that system Program erection schedule will create registry entry, judge second successively Chained list generate the node data in the second chained list that submodule 31 preserves whether with in event message record wait create The registry entry built is identical, if the second chained list exists the node data identical with registry entry to be created, Then send to blocking module 13 and intercept instruction.
Blocking module 13 is according to the interception instruction received, former by stop performing in Windows operating system Beginning NtSetvalueKey function, to stop program erection schedule to create registry entry.
The device of the present embodiment three, may be used for performing the technical scheme of embodiment of the method shown in Fig. 3, in fact Existing principle is similar with technique effect, and here is omitted.
Fig. 7 is the structural representation that the present invention intercepts the device embodiment four that rogue program is installed, such as Fig. 7 institute Showing, the device of the present embodiment four, on the basis of Fig. 4 shown device structure, also includes: configurable file is raw Become module 14, for directory path and/or the registry entry of statistics known malicious program creation in advance, according to system The data genaration counted can configure file and stores.
The embodiment of the present invention also provides for a kind of electronic equipment.Fig. 8 is one embodiment of electronic equipment of the present invention Structural representation, it is possible to achieve Fig. 1 or Fig. 2 of the present invention or the flow process of embodiment illustrated in fig. 3, such as Fig. 8 institute Showing, above-mentioned electronic equipment may include that housing 41, processor 42, memorizer 43, circuit board 44 and electricity Source circuit 45, wherein, circuit board 44 is placed in the interior volume that housing 41 surrounds, processor 42 and storage Device 43 is arranged on circuit board 44;Power circuit 45, is used for each circuit for above-mentioned electronic equipment or device Part is powered;Memorizer 43 is used for storing executable program code;Processor 42 is by reading in memorizer 43 The executable program code of storage runs the program corresponding with executable program code, is used for performing aforementioned The method intercepting rogue program installation described in one embodiment.
This electronic equipment exists in a variety of forms, includes but not limited to:
(1) mobile communication equipment: the feature of this kind equipment is to possess mobile communication function, and with provide speech, Data communication is main target.This Terminal Type includes: smart mobile phone (such as iPhone), multimedia handset, Functional mobile phone, and low-end mobile phone etc..
(2) super mobile personal computer equipment: this kind equipment belongs to the category of personal computer, has calculating and place Reason function, the most also possesses mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment Deng, such as iPad.
(3) portable entertainment device: this kind equipment can show and play content of multimedia.This kind equipment includes: Audio frequency, video playback module (such as iPod), handheld device, e-book, and intelligent toy and portable Formula in-vehicle navigation apparatus.
(4) server: provide calculate service equipment, the composition of server include processor, hard disk, internal memory, System bus etc., server is similar with general computer architecture, but owing to needing to provide highly reliable clothes Business, therefore at aspects such as disposal ability, stability, reliability, safety, extensibility, manageabilitys Require higher.
(5) other have the electronic equipment of data interaction function.
It should be noted that in this article, the relational terms of such as first and second or the like be used merely to by One entity or operation separate with another entity or operating space, and not necessarily require or imply these Relation or the order of any this reality is there is between entity or operation.And, term " includes ", " bag Contain " or its any other variant be intended to comprising of nonexcludability, so that include a series of key element Process, method, article or equipment not only include those key elements, but also include being not expressly set out Other key elements, or also include the key element intrinsic for this process, method, article or equipment.? In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that at bag Include and the process of described key element, method, article or equipment there is also other identical element.
Each embodiment in this specification all uses relevant mode to describe, phase homophase between each embodiment As part see mutually, what each embodiment stressed is the difference with other embodiments. For device embodiment, owing to it is substantially similar to embodiment of the method, so the comparison described Simply, relevant part sees the part of embodiment of the method and illustrates.
For convenience of description, describing apparatus above is to be divided into various units/modules to be respectively described with function.When So, can be the function of each unit/module in same or multiple softwares and/or hardware when implementing the present invention Realize.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, Or random store-memory body (Random Access Memory, RAM) etc. ROM).
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention Should be as the criterion with scope of the claims.

Claims (10)

1. one kind intercepts the method that rogue program is installed, it is characterised in that including:
Monitoring system Program erection schedule will create directory and/or the event message of registry entry;Wherein, Described event message includes directory path to be created and/or registry entry;
Judge in the configurable file pre-set, if record has described directory path to be created and/or note Volume list item;Wherein, configurable file record has directory path and/or the registry entry stoping establishment;
If record has described directory path to be created and/or registry entry in described configurable file, then stop Described program erection schedule creaties directory and/or registry entry.
Intercept the method that rogue program is installed the most according to claim 1, it is characterised in that described system For Windows operating system;
Described monitoring system Program erection schedule will create directory and/or registry entry event message it Before, described method also includes: pre-set the file of the file system binding described Windows operating system System filter driver, described file system filter driver is used for driving File Open routine;
The event message that described monitoring system Program erection schedule will create directory, including: by described The event that the described system Program erection schedule of file system filter driver monitoring will create directory disappears Breath.
Intercept the method that rogue program is installed the most according to claim 2, it is characterised in that described judgement In the configurable file pre-set, if record has described directory path to be created, including:
Read all preventions of record in the configurable file pre-set by described File Open routine to create Directory path and be saved in the first chained list;Each node data of described first chained list is configurable file The directory path that one prevention of middle record creates;
Judge that the node data in described first chained list is the most identical with described directory path to be created successively, If described first chained list existing the node data identical with described directory path to be created, it is determined that described In configurable file, record has described directory path to be created, otherwise, it is determined that in described configurable file Do not record described directory path to be created.
Intercept the method that rogue program is installed the most according to claim 3, it is characterised in that described prevention Described program erection schedule creaties directory, including:
Described file system filter driver calls the function IoCompleteRequest that completes of IRP and terminates institute State File Open routine, and return to the file system of Windows operating system.
Intercept the method that rogue program is installed the most according to claim 1, it is characterised in that described system For Windows operating system;
Described monitoring system Program erection schedule will create directory and/or registry entry event message it Before, described method also includes: pre-set hook for arranging and the function of edit the registry key assignments The Hook Function of NtSetvalueKey;
Described monitoring system Program erection schedule will create the event message of registry entry, including: pass through Described Hook Function monitors described system Program erection schedule will create the event message of registry entry.
Interception rogue program the most according to claim 5 install method, it is characterised in that described in sentence In the disconnected configurable file pre-set, if record has described registry entry to be created, including:
The note that in the configurable file pre-set, all preventions of record create is read by described Hook Function Volume list item is also saved in the second chained list;Each node data of described second chained list is for remembering in configurable file The registry entry that one prevention of record creates;
Judge that the node data in described second chained list is the most identical with described registry entry to be created successively, If described second chained list existing the node data identical with described registry entry to be created, it is determined that described In configurable file, record has described registry entry to be created, otherwise, it is determined that in described configurable file Do not record described registry entry to be created.
Intercept the method that rogue program is installed the most according to claim 6, it is characterised in that described prevention Described program erection schedule creates registry entry, including:
Stop performing the original NtSetvalueKey function in Windows operating system.
8., according to the method intercepting rogue program installation described in any one of claim 1 to 7, its feature exists In, described monitoring system Program erection schedule will create directory and/or registry entry event message it Before, also include:
The directory path of statistics known malicious program creation and/or registry entry;
Described configurable file is write according to the data counted on.
9. one kind intercepts the device that rogue program is installed, it is characterised in that including:
Monitoring module, will create directory and/or the thing of registry entry for monitoring system Program erection schedule Part message;Wherein, described event message includes directory path to be created and/or registry entry;
Judge module, for judging in the configurable file pre-set, if record has described monitoring module Directory path to be created in the described event message received and/or registry entry;Wherein, configurable file Record has directory path and/or the registry entry stoping establishment;
Blocking module, in described judge module judges described configurable file record have described in wait to create When the directory path built and/or registry entry, described program erection schedule is stoped to create directory and/or registration table ?.
Intercept the device that rogue program is installed the most according to claim 9, it is characterised in that described prison Control module includes:
Catalogue monitoring submodule, for pre-setting the literary composition of the file system binding with Windows operating system Part system filter driver, described file system filter driver is used for driving File Open routine;Institute State catalogue monitoring submodule to be additionally operable to operate system by described file system filter driver monitoring Windows The event message that system Program erection schedule will create directory.
CN201610327338.7A 2016-05-17 2016-05-17 Method and device for intercepting installation of malicious program and electronic equipment Pending CN106022100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610327338.7A CN106022100A (en) 2016-05-17 2016-05-17 Method and device for intercepting installation of malicious program and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610327338.7A CN106022100A (en) 2016-05-17 2016-05-17 Method and device for intercepting installation of malicious program and electronic equipment

Publications (1)

Publication Number Publication Date
CN106022100A true CN106022100A (en) 2016-10-12

Family

ID=57097338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610327338.7A Pending CN106022100A (en) 2016-05-17 2016-05-17 Method and device for intercepting installation of malicious program and electronic equipment

Country Status (1)

Country Link
CN (1) CN106022100A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108459879A (en) * 2018-01-17 2018-08-28 宇龙计算机通信科技(深圳)有限公司 A kind of method preventing terminal crash, terminal
CN108734006A (en) * 2018-05-25 2018-11-02 山东华软金盾软件股份有限公司 A method of disabling Windows installation procedures
WO2019119850A1 (en) * 2017-12-21 2019-06-27 中兴通讯股份有限公司 Application software deployment method and device, and virtual machine
CN110674504A (en) * 2019-09-25 2020-01-10 杭州安恒信息技术股份有限公司 Malicious program cleaning method and device for windows
CN111783087A (en) * 2020-06-02 2020-10-16 Oppo广东移动通信有限公司 Method and device for detecting malicious execution of executable file, terminal and storage medium
CN115794564A (en) * 2023-02-07 2023-03-14 北京江民新科技术有限公司 Process monitoring method and computer-readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667236A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for controlling driver installation
CN102004877A (en) * 2010-11-19 2011-04-06 珠海市君天电子科技有限公司 Method for monitoring source of computer virus
CN103019765A (en) * 2012-11-15 2013-04-03 北京奇虎科技有限公司 File redirection method, device and computer system
CN103235913A (en) * 2013-04-03 2013-08-07 北京奇虎科技有限公司 System, equipment and method used for identifying and intercepting bundled software
CN104679638A (en) * 2013-12-02 2015-06-03 中国银联股份有限公司 Method and device for monitoring file based on file property matching degree
CN104915593A (en) * 2014-03-14 2015-09-16 北京奇虎科技有限公司 Binding removing processing method and system for software
US9203862B1 (en) * 2012-07-03 2015-12-01 Bromium, Inc. Centralized storage and management of malware manifests

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667236A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for controlling driver installation
CN102004877A (en) * 2010-11-19 2011-04-06 珠海市君天电子科技有限公司 Method for monitoring source of computer virus
US9203862B1 (en) * 2012-07-03 2015-12-01 Bromium, Inc. Centralized storage and management of malware manifests
CN103019765A (en) * 2012-11-15 2013-04-03 北京奇虎科技有限公司 File redirection method, device and computer system
CN103235913A (en) * 2013-04-03 2013-08-07 北京奇虎科技有限公司 System, equipment and method used for identifying and intercepting bundled software
CN104679638A (en) * 2013-12-02 2015-06-03 中国银联股份有限公司 Method and device for monitoring file based on file property matching degree
CN104915593A (en) * 2014-03-14 2015-09-16 北京奇虎科技有限公司 Binding removing processing method and system for software

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴家碚等: "结构体与共同体", 《C语言程序设计与应用(高职)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119850A1 (en) * 2017-12-21 2019-06-27 中兴通讯股份有限公司 Application software deployment method and device, and virtual machine
CN108459879A (en) * 2018-01-17 2018-08-28 宇龙计算机通信科技(深圳)有限公司 A kind of method preventing terminal crash, terminal
CN108734006A (en) * 2018-05-25 2018-11-02 山东华软金盾软件股份有限公司 A method of disabling Windows installation procedures
CN110674504A (en) * 2019-09-25 2020-01-10 杭州安恒信息技术股份有限公司 Malicious program cleaning method and device for windows
CN111783087A (en) * 2020-06-02 2020-10-16 Oppo广东移动通信有限公司 Method and device for detecting malicious execution of executable file, terminal and storage medium
CN115794564A (en) * 2023-02-07 2023-03-14 北京江民新科技术有限公司 Process monitoring method and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN106022100A (en) Method and device for intercepting installation of malicious program and electronic equipment
CN102110220B (en) Application program monitoring method and device
CN106790001B (en) Unified interface-based multi-system role authority management method and system
CN102236764B (en) Method and monitoring system for Android system to defend against desktop information attack
JP5363305B2 (en) Method for determining the ID of an electronic device
EP2035968A1 (en) Method and apparatus for searching rights object and mapping method and mapping apparatus for the same
CN102024121A (en) Platform security apparatus and method thereof
CN103299658A (en) Management of mobile applications
CN103294950A (en) High-power secret information stealing malicious code detection method and system based on backward tracing
CN108170485A (en) A kind of plug-in loading method, device and mobile terminal
CN106169047A (en) Method and device for opening monitoring camera and electronic equipment
CN106055968A (en) Permission setting method and device and electronic equipment
CN102760096A (en) Test data generation method, unit testing method and unit testing system
CN108319849A (en) Equipment strategy management system based on Android twin containers system and management domain implementation method
CN104391846B (en) Social application public&#39;s account searching method and system
CN106126282A (en) Injection method and device for dynamic link library file and terminal equipment
CN107566375B (en) Access control method and device
CN103064678A (en) Method and device for call control of hardware instruction
CN106127034A (en) Method and device for preventing system from being closed maliciously and electronic equipment
CN102469083A (en) User authentication method and apparatus thereof, and enterprise system
CN106355100A (en) Safety protection system and method
CN106022090A (en) User login information processing method, user login information processing device and electronic equipment
CN103729604B (en) A kind of method and apparatus in customer access area territory
CN106127050A (en) Method and device for preventing system cursor from being maliciously modified and electronic equipment
CN103369533A (en) Antitheft method and antitheft device of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190118

Address after: 519031 Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province

Applicant after: Zhuhai Leopard Technology Co.,Ltd.

Address before: 100085 East District, No. 33 Xiaoying West Road, Haidian District, Beijing

Applicant before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012

RJ01 Rejection of invention patent application after publication