CN109271789A - Malicious process detection method, device, electronic equipment and storage medium - Google Patents

Malicious process detection method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109271789A
CN109271789A CN201811135316.6A CN201811135316A CN109271789A CN 109271789 A CN109271789 A CN 109271789A CN 201811135316 A CN201811135316 A CN 201811135316A CN 109271789 A CN109271789 A CN 109271789A
Authority
CN
China
Prior art keywords
thread
target
shellcode
address space
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811135316.6A
Other languages
Chinese (zh)
Other versions
CN109271789B (en
Inventor
苏文杰
杨峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Seal Interest Technology Co Ltd
Original Assignee
Zhuhai Juntian Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Juntian Electronic Technology Co Ltd filed Critical Zhuhai Juntian Electronic Technology Co Ltd
Priority to CN201811135316.6A priority Critical patent/CN109271789B/en
Publication of CN109271789A publication Critical patent/CN109271789A/en
Application granted granted Critical
Publication of CN109271789B publication Critical patent/CN109271789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Abstract

The embodiment of the present invention provides a kind of malicious process detection method, device, electronic equipment and storage medium, is difficult to the technical issues of driving process is controlled by Malware for solving, and wherein method includes: to obtain the corresponding process identification (PID) of target process;The corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID);The corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution address spaces;Determine the target process whether by malicious modification according to the multiple execution address space and the multiple execution module.Implement the embodiment of the present invention, the safety of electronic equipment can be improved.

Description

Malicious process detection method, device, electronic equipment and storage medium
Technical field
The present invention relates to technical field of electronic equipment, and in particular to a kind of malicious process detection method, device, electronic equipment And storage medium.
Background technique
Malware refers to virus, the program of worm and Trojan Horse for executing malice task on the computer systems, leads to Destruction software process is crossed to implement control.And with the development of electronic device technology, the development and spread speed of Malware It is getting faster.
Driver is generally referred to as device driver (Device Driver), be one kind can make electronic equipment and The separate procedure of equipment communication.It is equivalent to the interface of hardware, operating system only passes through this interface, just can control hardware device Work.If Malware is implanted into driver, the safety of electronic equipment is necessarily affected.
Summary of the invention
The embodiment of the present invention provides a kind of malicious process detection method, device, electronic equipment and storage medium, for solving It is difficult to the technical issues of driving process is controlled by Malware, the safety of electronic equipment can be improved.
First aspect of the embodiment of the present invention provides a kind of malicious process detection method, comprising:
Obtain the corresponding process identification (PID) of target process;
The corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID);
The corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution address spaces;
Determine the target process whether by malice according to the multiple execution address space and the multiple execution module Modification.
In conjunction with the embodiment of the present invention in a first aspect, first aspect of the embodiment of the present invention the first possible implementation In, it is described to determine whether the target process is maliciously repaired according to the multiple execution address space and the multiple execution module Change, comprising:
By each execution in each execution address space in the multiple execution address space and the multiple execution module Module is matched;
If the multiple target executed in address space executes address space and holds with each in the multiple execution module It fails to match for row module, then is labeled as the thread information that the target executes the corresponding subject thread of address space Shellcode thread information;
Determine the target process whether by malicious modification according to the Shellcode thread information.
In conjunction with the first possible implementation of first aspect of the embodiment of the present invention, in first aspect of the embodiment of the present invention Second of possible implementation in, it is described according to the Shellcode thread information determine the target process whether by Malicious modification, comprising:
The corresponding initial address of Shellcode thread is obtained according to the Shellcode thread information;
The corresponding Shellcode module of the Shellcode thread is obtained according to the initial address;
Obtain the corresponding debugging file information of the Shellcode module;
If the debugging file information meets default interception rule, it is determined that the target process is by malicious modification.
In conjunction with second of possible implementation of first aspect of the embodiment of the present invention, in first aspect of the embodiment of the present invention The third possible implementation in, the method also includes:
Obtaining the corresponding portable of each dangerous process in predetermined multiple dangerous processes can be performed PE the file information, To obtain multiple PE the file informations;
The multiple PE the file information is analyzed, to obtain multiple target dimensions;
Obtain in the multiple PE the file information in every PE the file information with each target in the multiple target dimension The corresponding characteristic information of dimension, to obtain multiple characteristic information collection;
The default interception rule is generated according to the multiple characteristic information collection.
In conjunction with the third possible implementation of first aspect of the embodiment of the present invention, in first aspect of the embodiment of the present invention The 4th kind of possible implementation in, the multiple PE the file information of the analysis, to obtain multiple target dimensions, comprising:
The corresponding attribute type of every PE the file information in the multiple PE the file information is obtained, multiple Attribute class are obtained Type;
The corresponding malicious modification probability of each attribute type in the multiple attribute type is obtained, is repaired with obtaining multiple malice Change probability;
Using in the multiple malicious modification probability be less than targets threshold the corresponding attribute type of malicious modification probability as The target dimension.
Second aspect of the embodiment of the present invention provides a kind of malicious process detection device, comprising:
Acquiring unit, for obtaining the corresponding process identification (PID) of target process;
Determination unit, for determining the corresponding multiple threads of the target process and multiple execution according to the process identification (PID) Module;
The acquiring unit is also used to obtain the corresponding execution address space of each thread in the multiple thread, with To multiple execution address spaces;
The determination unit is also used to according to the multiple execution address space and the determination of the multiple execution module Whether target process is by malicious modification.
In conjunction with second aspect of the embodiment of the present invention, in the first possible implementation of second aspect of the embodiment of the present invention In, determine the target process whether by malice according to the multiple execution address space and the multiple execution module described Modification aspect, the determination unit be specifically used for by each execution address space in the multiple executions address space with it is described more Each execution module is matched in a execution module;If it is the multiple execute address space in target execute address space with It fails to match for each execution module in the multiple execution module, then the target is executed the corresponding score of address space The thread information of journey is labeled as Shellcode thread information;The target process is determined according to the Shellcode thread information Whether by malicious modification.
In conjunction with the first possible implementation of second aspect of the embodiment of the present invention, in second aspect of the embodiment of the present invention Second of possible implementation in, whether the target process is determined according to the Shellcode thread information described In terms of malicious modification, the acquiring unit is also used to obtain Shellcode thread pair according to the Shellcode thread information The initial address answered;The corresponding Shellcode module of the Shellcode thread is obtained according to the initial address;Obtain institute State the corresponding debugging file information of Shellcode module;If the determination unit meets specifically for the debugging file information It is default to intercept rule, it is determined that the target process is by malicious modification.
In conjunction with second of possible implementation of second aspect of the embodiment of the present invention, in second aspect of the embodiment of the present invention The third possible implementation in, the acquiring unit is also used to obtain each danger in predetermined multiple dangerous processes PE the file information can be performed in the corresponding portable of dangerous process, to obtain multiple PE the file informations;Analyze the multiple PE file letter Breath, to obtain multiple target dimensions;Obtain in the multiple PE the file information in every PE the file information with the multiple target The corresponding characteristic information of each target dimension in dimension, to obtain multiple characteristic information collection;According to the multiple characteristic information collection Generate the default interception rule.
In conjunction with the third possible implementation of second aspect of the embodiment of the present invention, in second aspect of the embodiment of the present invention The 4th kind of possible implementation in, in the multiple PE the file information of the analysis, in terms of obtaining multiple target dimensions, The acquiring unit is obtained specifically for the corresponding attribute type of PE the file information every in the multiple PE the file information of acquisition Multiple attribute types;The corresponding malicious modification probability of each attribute type in the multiple attribute type is obtained, it is multiple to obtain Malicious modification probability;The corresponding attribute type of malicious modification probability of targets threshold will be less than in the multiple malicious modification probability As the target dimension.
The third aspect of the embodiment of the present invention provide a kind of electronic equipment, comprising: shell, processor, memory, circuit board and Power circuit, wherein circuit board is placed in the space interior that shell surrounds, and processor and memory setting are on circuit boards;Electricity Source circuit, for each circuit or the device power supply for electronic equipment;Memory is for storing executable program code;Processor Program corresponding with executable program code is run by reading the executable program code stored in memory, for holding The malicious process detection method that row first aspect of the embodiment of the present invention provides.
Fourth aspect of the embodiment of the present invention provides a kind of non-transitorycomputer readable storage medium, wherein the storage Medium realizes that first aspect of the embodiment of the present invention mentions for storing computer program, when the computer program is executed by processor The malicious process detection method of confession.
The 5th aspect of the embodiment of the present invention provides a kind of application program, wherein the application program for holding at runtime A kind of malicious process detection method that row first aspect of the embodiment of the present invention provides.
In the embodiment of the present invention, the corresponding process identification (PID) of target process is obtained, the mesh is determined according to the process identification (PID) It is empty to obtain the corresponding execution address of each thread in the multiple thread for the corresponding multiple threads of mark process and multiple execution modules Between to obtain multiple execution address spaces, the mesh is determined according to the multiple execution address space and the multiple execution module Whether mark process is by malicious modification.In this way, according to thread execute specific location and process it is corresponding execute template position into Whether row identification detects the target process by malicious modification, improves the Accuracy and high efficiency of detection Malware.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of malicious process detection method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another malicious process detection method provided in an embodiment of the present invention;
Fig. 3 is a kind of structure chart of malicious process detection device provided in an embodiment of the present invention;
Fig. 4 is the structure chart of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in the attached drawing, " second " and " third " etc. are For distinguishing different objects, it is not use to describe a particular order.In addition, term " includes " and " having " and their any changes Shape, it is intended that cover and non-exclusive include.Such as contain the process, method of a series of steps or units, system, product or Equipment is not limited to listed step or unit, but optionally further comprising the step of not listing or unit or optional Ground further includes the other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Electronic equipment described in the embodiment of the present invention may include smart phone (such as Android phone), tablet computer, Palm PC, laptop, mobile internet device (Mobile Internet Devices, MID) or wearable device It is only citing Deng, above equipment, and it is non exhaustive, including but not limited to above-mentioned electronic equipment.
In order to facilitate understanding, the word designed in the embodiment of the present invention is explained first:
Process (Process) is program in computer about the primary operation activity on certain data acquisition system, be system into The basic unit of row Resource Distribution and Schedule is the basis of operating system configuration.In computer structure of the early stage towards process design In structure, process is the basic execution entity of program;In computer configuation of the present age towards threaded design, process is the appearance of thread Device.Program is the description of instruction, data and its organizational form, and process is the entity of program.
Thread, sometimes referred to as lightweight process (Lightweight Process, LWP) are the minimum lists that program executes stream Member.The thread of one standard is by Thread Id, current instruction pointer (PC), set of registers and storehouse composition.In addition, thread be into An entity in journey, is the basic unit independently dispatched and assigned by system, and thread oneself does not possess system resource, only possesses Essential resource in operation a bit, but it can be shared with the other threads for belonging to a process process be possessed it is complete Portion's resource.One thread can create and cancel another thread, can concurrently execute between multiple threads in same process. At least one thread of each program, if only one thread of program, that is, program itself.
(Portable Executable, PE) file: the program in Microsoft's Windows operating system can be performed in portable File (may be to be performed indirectly, such as dynamic link library (Dynamic Link Library, DLL) file).
Dll file: in systems, many application programs are not a complete executable file, they are divided into Some relatively independent dynamic link libraries, i.e. dll file.When executing some program, corresponding dll file will be adjusted With each DLL realizes different software functions.Tester can write new dll file and allow target program load and execution.
Program data base (program database, PDB) file: being the Integrated Development Environment software provided using Microsoft The symbol file for debugging that (Microsoft Visual studio, VS) is generated, in store Debugging message.PE file is deposited Storage is usually with the presence of program data base (Program Database, PDB) document form.The in store application program two of PDB file The debugging and project status information of binary file, have recorded all variables, the relative position of main information table and size, these tables It can be reserved for resource, importing, export, reorientation, debugging, thread-local storage and The Component Object Model (Component Object Model, COM) operation when for information about.Debugging message can help tuner to analyze the interior layout of debugged program, work as journey When sequence recompilates, Debugging message can correctly reflect the modification of variable and function, can be to program using these information Debugging configuration carry out increment link.
And Debugging message is equally generated in the operational process of the corresponding application program of Malware, i.e., there is also PDB file, And the PDB file is difficult to modify, therefore analyzes the PDB file, facilitates the further analysis to malice sample and provides Clue.
Shellcode is one section of code (being also possible to fill data), is for being sent to server by utilizing particular vulnerability Code, general available permission.In addition, Shellcode is usually that data is used as to be sent under fire server.
The embodiment of the present invention provides a kind of malicious process detection method, device, electronic equipment and storage medium, for solving It is difficult to the technical issues of driving process is controlled by Malware, the safety of electronic equipment can be improved.It carries out individually below It is described in detail.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of malicious process detection method provided in an embodiment of the present invention.Its In, which is suitable for the electronic equipments such as mobile phone, tablet computer.As shown in Figure 1, the malicious process detection side Method may comprise steps of.
S101, the corresponding process identification (PID) of target process is obtained.
In this application, target process can be the corresponding process of operating system of electronic equipment, is also possible to electronics and sets Corresponding process of standby middle installation application etc., further, which is driving process.
Method of the application for obtaining the corresponding process identification (PID) of target process without limitation, can be detected a starting and refer to It enables, which includes the identification information of the target process, in this way, process identification (PID) can be obtained;It can also be according to target process pair The file path answered obtains mark or process identification (PID) of target program etc..
The application also without limitation can pass through virus for obtaining the execution condition of the corresponding process identification (PID) of target process Inspection software (such as: Jinshan anti-virus software) periodically target process is obtained, it can also be obtained etc. when target process starts, That is, periodically or when starting detecting whether target process is modified by rogue program.
S102, the corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID).
In this application, thread includes the mark of executive process, and executing template also includes the corresponding mark of executive process, such as This, can determine that the multiple threads for executing the target process are corresponding with the target process is executed according to the process identification (PID) of target process Multiple execution modules.
S103, the corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution addresses Space.
S104, determined according to the multiple execution address space and the multiple execution module the target process whether by Malicious modification.
In this application, thread is not hardware, and executing address space is the position that thread executes, that is to say, that according to thread The corresponding position for executing template of the specific location and process of execution is identified, to determine whether target process is maliciously repaired Change.
In the malicious process detection method described in Fig. 1, obtain the corresponding process identification (PID) of target process, according to it is described into Journey, which identifies, determines the corresponding multiple threads of target process and multiple execution modules, obtains each thread in the multiple thread Corresponding execution address space according to the multiple execution address space and the multiple is held with obtaining multiple execution address spaces Whether row module determines the target process by malicious modification.In this way, corresponding according to the specific location of thread execution and process The position for executing template is identified, whether is detected the target process by malicious modification, is improved the accurate of detection Malware Property and high efficiency.
It is consistent with the embodiment of Fig. 1, referring to Fig. 2, Fig. 2 is another malicious process detection provided in an embodiment of the present invention The flow chart of method.Wherein, which is suitable for the electronic equipments such as mobile phone, tablet computer.As shown in Fig. 2, the evil Meaning process detection method may comprise steps of.
S201, the corresponding process identification (PID) of target process is obtained.
S202, the corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID).
S203, the corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution addresses Space.
Wherein, step S201~S203 can refer to the description of step S101~S103, and details are not described herein.
S204, by each execution address space in the multiple execution address space with it is each in the multiple execution module Execution module is matched.
If S205, the multiple target executed in address space execute address space and in the multiple execution module It fails to match for each execution module, then is labeled as the thread information that the target executes the corresponding subject thread of address space Shellcode thread information.
It is appreciated that since Shellcode is one section of code, if in the target process including Shellcode, thread pair The inevitable address corresponding from execution module in the execution address answered is different, then executes ground for each in the multiple execution address space Location space is matched with each execution module in the multiple execution module, when target executes address space and each execution mould It fails to match for block, then it represents that it is one section of specific code that target, which executes address, therefore, the target can be executed address space and made For Shellcode thread information, in this way, identified according to the Shellcode thread information, with determine target process whether by Malicious modification.
S206, determine the target process whether by malicious modification according to the Shellcode thread information.
Since the corresponding thread of Shellcode thread information is mismatched with execution module, then further basis should Whether Shellcode thread information is identified, to determine the target process by malicious modification.The application for how basis Shellcode thread information determine target process whether by malicious modification without limitation, it is described in a kind of possible embodiment Determine the target process whether by malicious modification according to the Shellcode thread information, comprising: according to described Shellcode thread information obtains the corresponding initial address of Shellcode thread;According to initial address acquisition The corresponding Shellcode module of Shellcode thread;Obtain the corresponding debugging file information of the Shellcode module;If institute It states debugging file information and meets default interception rule, it is determined that the target process is by malicious modification.
Wherein, initial address is the corresponding execution address of Shellcode thread.It is appreciated that according to the Shellcode Thread information obtains the corresponding initial address of Shellcode thread, determines further according to the initial address and executes the Shellcode line The corresponding Shellcode module of journey, then the corresponding debugging file information of Shellcode module is obtained, if the debugging file information Meet default interception rule, it is determined that target process is by malicious modification, and modifying content is that Shellcode thread information is corresponding Program.
The application intercepts rule without limitation for default, can be the naming rule of file or variable name, is also possible to The safety of store path can also be the relevance etc. between file identification and target process.
In a kind of possible embodiment, the method also includes: it obtains each in predetermined multiple dangerous processes PE the file information can be performed in the corresponding portable of dangerous process, to obtain multiple PE the file informations;Analyze the multiple PE file Information, to obtain multiple target dimensions;Obtain in the multiple PE the file information in every PE the file information with the multiple mesh The corresponding characteristic information of each target dimension in dimension is marked, to obtain multiple characteristic information collection;According to the multiple characteristic information Collection generates the default interception rule.
Wherein, dangerous process is safety verification and the dangerous process of tool of determination to be carried out in electronic equipment or to electricity Sub- equipment generates dangerous process, for safety verification method without limitation, periodic scanning can be carried out by security software, Can every time software starting when or installation software after carry out security sweep etc..
Multiple PE the file informations are the file information of the corresponding PE file of each dangerous process in multiple dangerous processes, wherein It include PDB file, the i.e. Debugging message of the process in each PE the file information.
It is appreciated that obtaining the corresponding PE the file information of each dangerous process in multiple dangerous processes first to obtain multiple PE Then the file information is analyzed to obtain multiple target dimensions to multiple PE the file informations, thus true according to multiple target dimensions Fixed multiple characteristic information collection corresponding with multiple PE the file informations generate the default interception further according to multiple characteristic information collection and advise Then, in this way, default interception rule is generated according to target dimension, convenient for improving the accuracy of detection.
The application for determine target dimension method without limitation, in a kind of possible embodiment, the analysis institute Multiple PE the file informations are stated, to obtain multiple target dimensions, comprising: obtain every PE file letter in the multiple PE the file information Corresponding attribute type is ceased, multiple attribute types are obtained;Obtain the corresponding evil of each attribute type in the multiple attribute type Meaning modification probability, to obtain multiple malicious modification probability;The malice of targets threshold will be less than in the multiple malicious modification probability The corresponding attribute type of probability is modified as the target dimension.
Wherein, attribute type includes file path, File header information, checks all records, and shows the inclined of each record Move each types such as address, length, attribute, mark;Malicious modification probability is modified for each attribute type by rogue program general Rate value, malicious modification probability is bigger, then easily modified.
It is appreciated that first determining that the corresponding attribute type of each the file information obtains multiple attribute types, then determine each The malicious modification probability of attribute type obtains multiple malicious modification probability, in this way, choosing malicious modification from multiple attribute types The attribute type that probability is less than targets threshold obtains multiple target dimensions, that is, the corresponding characteristic information of the target dimension chosen is difficult to It is modified, to improve the accuracy of detection target program.
The application for targets threshold without limitation, in a kind of possible embodiment, the method also includes: using disappearing Breath digest algorithm is compiled the target process, obtains hashed value;The targets threshold is determined according to the hashed value.
Wherein, Message Digest 5 (MD4 Message-Digest Algorithm) is a kind of password being widely used Hash function can produce out the hashed value (hash value) of one 128 (16 byte), for ensuring that information transmission is complete Unanimously.
It is appreciated that being compiled to obtain hashed value to target program using Message Digest 5, further according to hashed value pair The malicious modification determine the probability targets threshold answered, in this way, can be convenient for the accuracy of determining targets threshold.
In the malicious process detection method described in Fig. 2, obtain the corresponding process identification (PID) of target process, according to it is described into Journey, which identifies, determines the corresponding multiple threads of target process and multiple execution modules, obtains each thread in the multiple thread Corresponding execution address space is to obtain multiple execution address spaces, then, holds each in the multiple execution address space Row address space is matched with each execution module in the multiple execution module, if in the multiple execution address space Target executes each execution module in address space and the multiple execution module, and it fails to match, then executes ground for the target The thread information of the corresponding subject thread in location space is labeled as Shellcode thread information, is believed according to the Shellcode thread Whether breath determines the target process by malicious modification.In this way, generally will not be with being present in normal module according to Shellcode Whether the code in location space detects the target process by malicious modification, improves the Accuracy and high efficiency of detection Malware.
It is consistent with the embodiment of Fig. 1 and Fig. 2, referring to Fig. 3, Fig. 3 is a kind of malicious process provided in an embodiment of the present invention The structure chart of detection device.Wherein, which can be set in the electronic equipments such as mobile phone, tablet computer, As shown in figure 4, the malicious process detection device 300 includes:
Acquiring unit 301 is for obtaining the corresponding process identification (PID) of target process;
Determination unit 302 is used to determine the corresponding multiple threads of the target process according to the process identification (PID) and multiple hold Row module;
The acquiring unit 301 is also used to obtain the corresponding execution address space of each thread in the multiple thread, with Obtain multiple execution address spaces;
The determination unit 302 is also used to determine institute according to the multiple execution address space and the multiple execution module Target process is stated whether by malicious modification.
In a kind of possible embodiment, described according to the multiple execution address space and the multiple execution module Whether in terms of determining the target process by malicious modification, the determination unit 302 is specifically used for the multiple execution address Each execution address space is matched with each execution module in the multiple execution module in space;If the multiple execution Target in address space executes each execution module in address space and the multiple execution module, and it fails to match, then by institute It states target and executes the thread information of the corresponding subject thread of address space labeled as Shellcode thread information;According to described Whether Shellcode thread information determines the target process by malicious modification.
In a kind of possible embodiment, the target process is determined according to the Shellcode thread information described Whether in terms of by malicious modification, the acquiring unit 301 is also used to be obtained according to the Shellcode thread information The corresponding initial address of Shellcode thread;It is corresponding that the Shellcode thread is obtained according to the initial address Shellcode module;Obtain the corresponding debugging file information of the Shellcode module;The determination unit 302 is specifically used for If the debugging file information meets default interception rule, it is determined that the target process is by malicious modification.
In a kind of possible embodiment, the acquiring unit 301 is also used to obtain predetermined multiple dangerous processes In the corresponding portable of each dangerous process PE the file information can be performed, to obtain multiple PE the file informations;It analyzes the multiple PE the file information, to obtain multiple target dimensions;Obtain in the multiple PE the file information in every PE the file information with it is described The corresponding characteristic information of each target dimension in multiple target dimensions, to obtain multiple characteristic information collection;According to the multiple spy Reference breath collection generates the default interception rule.
In a kind of possible embodiment, in the multiple PE the file information of analysis, to obtain multiple target dimensions Aspect, the acquiring unit 301 is specifically for the corresponding attribute of PE the file information every in the multiple PE the file information of acquisition Type obtains multiple attribute types;The corresponding malicious modification probability of each attribute type in the multiple attribute type is obtained, with Obtain multiple malicious modification probability;The malicious modification probability for being less than targets threshold in the multiple malicious modification probability is corresponding Attribute type is as the target dimension.
In the malicious process detection device described in Fig. 3, obtain the corresponding process identification (PID) of target process, according to it is described into Journey, which identifies, determines the corresponding multiple threads of target process and multiple execution modules, obtains each thread in the multiple thread Corresponding execution address space according to the multiple execution address space and the multiple is held with obtaining multiple execution address spaces Whether row module determines the target process by malicious modification.In this way, corresponding according to the specific location of thread execution and process The position for executing template is identified, whether is detected the target process by malicious modification, is improved the accurate of detection Malware Property and high efficiency.
It is consistent with the embodiment of Fig. 1 and Fig. 2, referring to Fig. 4, Fig. 4 is a kind of electronic equipment disclosed by the embodiments of the present invention. Wherein, electronic equipment can be mobile phone, tablet computer etc..As shown in figure 4, the electronic equipment may include shell 401, processor 402, memory 403, circuit board 404 and power circuit 405, wherein circuit board 404 is placed in the space interior that shell surrounds, Processor 402 and memory 403 are arranged on circuit board 404;Power circuit 405, for for electronic equipment each circuit or Device power supply;Memory 403 is for storing executable program code;Processor 402 can by what is stored in reading memory 403 Program code is executed to run program corresponding with executable program code, for executing following steps:
Obtain the corresponding process identification (PID) of target process;
The corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID);
The corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution address spaces;
Determine the target process whether by malice according to the multiple execution address space and the multiple execution module Modification.
As a kind of possible embodiment, described according to the multiple execution address space and the multiple execution mould In terms of whether block determines the target process by malicious modification, the processor 402 is specifically used for executing following operation:
By each execution in each execution address space in the multiple execution address space and the multiple execution module Module is matched;
If the multiple target executed in address space executes address space and holds with each in the multiple execution module It fails to match for row module, then is labeled as the thread information that the target executes the corresponding subject thread of address space Shellcode thread information;
Determine the target process whether by malicious modification according to the Shellcode thread information.
As a kind of possible embodiment, it is described according to the Shellcode thread information determine the target into In terms of whether journey is by malicious modification, the processor 402 is specifically used for executing following operation:
The corresponding initial address of Shellcode thread is obtained according to the Shellcode thread information;
The corresponding Shellcode module of the Shellcode thread is obtained according to the initial address;
Obtain the corresponding debugging file information of the Shellcode module;
If the debugging file information meets default interception rule, it is determined that the target process is by malicious modification.
As a kind of possible embodiment, the processor 402 is also used to execute following operation:
Obtaining the corresponding portable of each dangerous process in predetermined multiple dangerous processes can be performed PE the file information, To obtain multiple PE the file informations;
The multiple PE the file information is analyzed, to obtain multiple target dimensions;
Obtain in the multiple PE the file information in every PE the file information with each target in the multiple target dimension The corresponding characteristic information of dimension, to obtain multiple characteristic information collection;
The default interception rule is generated according to the multiple characteristic information collection.
As a kind of possible embodiment, in the multiple PE the file information of analysis, to obtain multiple target dimensions Degree aspect, the processor 402 are specifically used for executing following operation:
The corresponding attribute type of every PE the file information in the multiple PE the file information is obtained, multiple Attribute class are obtained Type;
The corresponding malicious modification probability of each attribute type in the multiple attribute type is obtained, is repaired with obtaining multiple malice Change probability;
Using in the multiple malicious modification probability be less than targets threshold the corresponding attribute type of malicious modification probability as The target dimension.
In the electronic equipment described in Fig. 4, the corresponding process identification (PID) of target process is obtained, it is true according to the process identification (PID) The fixed corresponding multiple threads of target process and multiple execution modules, obtain in the multiple thread that each thread is corresponding to be held Row address space is true according to the multiple execution address space and the multiple execution module to obtain multiple execution address spaces Whether the fixed target process is by malicious modification.In this way, according to the specific location and the corresponding execution template of process of thread execution Position identified, whether detect the target process by malicious modification, improve the accuracy and efficiently of detection Malware Property.
A kind of non-transitorycomputer readable storage medium is provided in one embodiment, is stored thereon with computer journey Sequence, wherein the malicious process detection method as shown in Fig. 1 or Fig. 2 embodiment is realized when the computer program is executed by processor.
A kind of application program is provided in one embodiment, and the application program for executing such as Fig. 1 or Fig. 2 at runtime Malicious process detection method shown in embodiment.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
It is provided for the embodiments of the invention malicious process detection method, device and electronic equipment above and has carried out detailed Jie It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (10)

1. a kind of malicious process detection method characterized by comprising
Obtain the corresponding process identification (PID) of target process;
The corresponding multiple threads of the target process and multiple execution modules are determined according to the process identification (PID);
The corresponding execution address space of each thread in the multiple thread is obtained, to obtain multiple execution address spaces;
Determine the target process whether by malicious modification according to the multiple execution address space and the multiple execution module.
2. the method according to claim 1, wherein described according to the multiple execution address space and described more Whether a execution module determines the target process by malicious modification, comprising:
By each execution module in each execution address space in the multiple execution address space and the multiple execution module It is matched;
If the multiple target executed in address space executes each execution mould in address space and the multiple execution module It fails to match for block, then the thread information that the target executes the corresponding subject thread of address space is labeled as Shellcode Thread information;
Determine the target process whether by malicious modification according to the Shellcode thread information.
3. according to the method described in claim 2, it is characterized in that, described determine institute according to the Shellcode thread information Target process is stated whether by malicious modification, comprising:
The corresponding initial address of Shellcode thread is obtained according to the Shellcode thread information;
The corresponding Shellcode module of the Shellcode thread is obtained according to the initial address;
Obtain the corresponding debugging file information of the Shellcode module;
If the debugging file information meets default interception rule, it is determined that the target process is by malicious modification.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
Obtaining the corresponding portable of each dangerous process in predetermined multiple dangerous processes can be performed PE the file information, with To multiple PE the file informations;
The multiple PE the file information is analyzed, to obtain multiple target dimensions;
Obtain in the multiple PE the file information in every PE the file information with each target dimension in the multiple target dimension Corresponding characteristic information, to obtain multiple characteristic information collection;
The default interception rule is generated according to the multiple characteristic information collection.
5. according to the method described in claim 4, it is characterized in that, the multiple PE the file information of analysis, more to obtain A target dimension, comprising:
The corresponding attribute type of every PE the file information in the multiple PE the file information is obtained, multiple attribute types are obtained;
The corresponding malicious modification probability of each attribute type in the multiple attribute type is obtained, it is general to obtain multiple malicious modifications Rate;
The corresponding attribute type of malicious modification probability of targets threshold will be less than in the multiple malicious modification probability as described in Target dimension.
6. a kind of malicious process detection device characterized by comprising
Acquiring unit, for obtaining the corresponding process identification (PID) of target process;
Determination unit, for determining the corresponding multiple threads of the target process and multiple execution moulds according to the process identification (PID) Block;
The acquiring unit is also used to obtain the corresponding execution address space of each thread in the multiple thread, more to obtain A execution address space;
The determination unit is also used to determine the target according to the multiple execution address space and the multiple execution module Whether process is by malicious modification.
7. device according to claim 6, which is characterized in that described according to the multiple execution address space and described In terms of whether multiple execution modules determine the target process by malicious modification, the determination unit is specifically used for will be the multiple Each execution address space in address space is executed to be matched with each execution module in the multiple execution module;If described Target in multiple execution address spaces executes address space and matches mistake with each execution module in the multiple execution module It loses, then the thread information that the target executes the corresponding subject thread of address space is labeled as Shellcode thread information;Root Determine the target process whether by malicious modification according to the Shellcode thread information.
8. device according to claim 7, which is characterized in that determined described according to the Shellcode thread information In terms of whether the target process is by malicious modification, the acquiring unit is also used to be obtained according to the Shellcode thread information Take the corresponding initial address of Shellcode thread;It is corresponding that the Shellcode thread is obtained according to the initial address Shellcode module;Obtain the corresponding debugging file information of the Shellcode module;If the determination unit is specifically used for The debugging file information meets default interception rule, it is determined that the target process is by malicious modification.
9. a kind of electronic equipment characterized by comprising shell, processor, memory, circuit board and power circuit, wherein Circuit board is placed in the space interior that shell surrounds, and processor and memory setting are on circuit boards;Power circuit, for being electric The each circuit or device of sub- equipment are powered;Memory is for storing executable program code;Processor is by reading memory The executable program code of middle storage runs program corresponding with executable program code, for executing such as claim 1- 5 described in any item methods.
10. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the meter Such as method as claimed in any one of claims 1 to 5 is realized when calculation machine program is executed by processor.
CN201811135316.6A 2018-09-27 2018-09-27 Malicious process detection method and device, electronic equipment and storage medium Active CN109271789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811135316.6A CN109271789B (en) 2018-09-27 2018-09-27 Malicious process detection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811135316.6A CN109271789B (en) 2018-09-27 2018-09-27 Malicious process detection method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109271789A true CN109271789A (en) 2019-01-25
CN109271789B CN109271789B (en) 2021-09-28

Family

ID=65197976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811135316.6A Active CN109271789B (en) 2018-09-27 2018-09-27 Malicious process detection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109271789B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889116A (en) * 2019-11-15 2020-03-17 珠海豹趣科技有限公司 Advertisement blocking method and device and electronic equipment
CN111639339A (en) * 2020-05-26 2020-09-08 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN111651763A (en) * 2020-05-26 2020-09-11 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN114285617A (en) * 2021-12-20 2022-04-05 北京安天网络安全技术有限公司 Network threat monitoring method and device, electronic equipment and readable storage medium
CN114792008A (en) * 2022-06-24 2022-07-26 珠海市魅族科技有限公司 Method, device, equipment and storage medium for reporting privilege-offering vulnerability data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103839007A (en) * 2014-03-03 2014-06-04 珠海市君天电子科技有限公司 Method and system for detecting abnormal threading
CN105095763A (en) * 2015-08-10 2015-11-25 北京金山安全软件有限公司 vulnerability defense method and device and electronic equipment
CN105488405A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 PDB debug information based malicious code analysis method and system
US9411953B1 (en) * 2013-05-24 2016-08-09 Symantec Corporation Tracking injected threads to remediate malware
CN106228066A (en) * 2016-07-13 2016-12-14 北京金山安全软件有限公司 Method and device for preventing malicious modification of process address space and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9411953B1 (en) * 2013-05-24 2016-08-09 Symantec Corporation Tracking injected threads to remediate malware
CN103839007A (en) * 2014-03-03 2014-06-04 珠海市君天电子科技有限公司 Method and system for detecting abnormal threading
CN105488405A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 PDB debug information based malicious code analysis method and system
CN105095763A (en) * 2015-08-10 2015-11-25 北京金山安全软件有限公司 vulnerability defense method and device and electronic equipment
CN106228066A (en) * 2016-07-13 2016-12-14 北京金山安全软件有限公司 Method and device for preventing malicious modification of process address space and terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889116A (en) * 2019-11-15 2020-03-17 珠海豹趣科技有限公司 Advertisement blocking method and device and electronic equipment
CN110889116B (en) * 2019-11-15 2024-02-27 珠海豹趣科技有限公司 Advertisement interception method and device and electronic equipment
CN111639339A (en) * 2020-05-26 2020-09-08 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN111651763A (en) * 2020-05-26 2020-09-11 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN111639339B (en) * 2020-05-26 2023-06-23 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN111651763B (en) * 2020-05-26 2023-08-22 珠海豹趣科技有限公司 Process monitoring method and device, electronic equipment and storage medium
CN114285617A (en) * 2021-12-20 2022-04-05 北京安天网络安全技术有限公司 Network threat monitoring method and device, electronic equipment and readable storage medium
CN114792008A (en) * 2022-06-24 2022-07-26 珠海市魅族科技有限公司 Method, device, equipment and storage medium for reporting privilege-offering vulnerability data

Also Published As

Publication number Publication date
CN109271789B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN109271789A (en) Malicious process detection method, device, electronic equipment and storage medium
US20180089422A1 (en) Technologies for deterministic code flow integrity protection
CN109388946A (en) Malicious process detection method, device, electronic equipment and storage medium
CN101853200B (en) High-efficiency dynamic software vulnerability exploiting method
CN102722672B (en) A kind of method and device detecting running environment authenticity
US20110153689A1 (en) Confirming the sensitivity of a data object in a managed object heap
CN105760787B (en) System and method for the malicious code in detection of random access memory
CN109471697B (en) Method, device and storage medium for monitoring system call in virtual machine
CN110866258B (en) Rapid vulnerability positioning method, electronic device and storage medium
CN102422299A (en) Information device, program, method for preventing execution of unauthorized program code, and computer readable recording medium
CN105701410A (en) Information, device and system for obtaining information in source codes
CN113569246A (en) Vulnerability detection method and device, computer equipment and storage medium
CN110941552A (en) Memory analysis method and device based on dynamic taint analysis
CN111191243A (en) Vulnerability detection method and device and storage medium
CN112671609A (en) Asset census and safety detection method and device and terminal equipment
US20180089432A1 (en) System and method for characterizing malware
EP3692456B1 (en) Binary image stack cookie protection
US20130152049A1 (en) Warning of register and storage area assignment errors
US20160092313A1 (en) Application Copy Counting Using Snapshot Backups For Licensing
US10133881B2 (en) Method and circuit arrangement for protecting against scanning of an address space
CN108733990B (en) Block chain-based file protection method and terminal equipment
CN107688481B (en) Multi-node-supporting KVM virtual machine hiding process detection system
EP3807799A1 (en) Binary risk evaluation
US20110131657A1 (en) Hooking nonexported functions by the offset of the function
Arnatovich et al. Empirical Comparison of Intermediate Representations for Android Applications.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20191125

Address after: Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province

Applicant after: Zhuhai Seal Interest Technology Co., Ltd.

Address before: 519070, No. 10, main building, No. six, science Road, Harbour Road, Tang Wan Town, Guangdong, Zhuhai, 601F

Applicant before: Zhuhai Juntian Electronic Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant