CN110647743A - Malicious behavior identification method and device and storage device - Google Patents

Malicious behavior identification method and device and storage device Download PDF

Info

Publication number
CN110647743A
CN110647743A CN201810668717.1A CN201810668717A CN110647743A CN 110647743 A CN110647743 A CN 110647743A CN 201810668717 A CN201810668717 A CN 201810668717A CN 110647743 A CN110647743 A CN 110647743A
Authority
CN
China
Prior art keywords
office program
office
determining
starting process
malicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810668717.1A
Other languages
Chinese (zh)
Inventor
张婷
韩文奇
王小丰
肖新光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ahtech Network Safe Technology Ltd
Original Assignee
Beijing Ahtech Network Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ahtech Network Safe Technology Ltd filed Critical Beijing Ahtech Network Safe Technology Ltd
Priority to CN201810668717.1A priority Critical patent/CN110647743A/en
Publication of CN110647743A publication Critical patent/CN110647743A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computing Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a method and a device for identifying malicious behaviors and storage equipment, which are used for solving the problem that the existing antivirus software is difficult to detect the behavior that Office viruses attack systems by using overflow vulnerabilities. The method comprises the following steps: monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process; and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.

Description

Malicious behavior identification method and device and storage device
Technical Field
The invention relates to the technical field of network security, in particular to a method and a device for identifying malicious behaviors and storage equipment.
Background
At present, Office software becomes indispensable software for users due to convenience and practicability, and Office requirements of Personal Computers (PCs) with limited internal networks or PCs capable of being connected with public networks need to be provided with the Office software, so that when Office documents with malicious behaviors are operated, the Office documents are attacked regardless of physical isolation, and loss of user data, property and the like is caused. Based on this, it is becoming a more and more favored means for hackers to make attacks using Office vulnerabilities.
At present, the detection of Office documents is mostly to judge whether malicious codes exist through feature codes, but when a document utilizes a 0Day vulnerability which is not disclosed by Office software, an antivirus engine cannot detect the document which utilizes the 0Day to construct a specific format. In addition, currently, through various existing tools, Office documents in a specific format are constructed so as to trigger buffer overflow more and more easily, hackers can easily attack the system by using the buffer overflow, the user can hardly perceive the attack by using the overflow vulnerability, and conventional antivirus software is difficult to detect at present.
In summary, it is difficult for the current antivirus software to detect the behavior of the virus in the Office program attacking the system by using the overflow vulnerability.
Disclosure of Invention
The embodiment of the invention provides a method and a device for identifying malicious behaviors and storage equipment, which are used for solving the problem that the existing antivirus software is difficult to detect the behavior that Office viruses attack systems by using overflow vulnerabilities.
Based on the above problem, an identification method for malicious behavior provided by the embodiment of the present invention includes:
monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.
The device for identifying malicious behaviors comprises a memory and a processor, wherein the memory is used for storing a plurality of instructions, and the processor is used for loading the instructions stored in the memory to execute:
monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.
The embodiment of the invention also provides a device for identifying malicious behaviors, which comprises:
the monitoring module is used for monitoring whether the Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and the determining module is used for determining that malicious behaviors exist in the Office program after the Office program calls the CreateRemoteThread function in the starting process.
The embodiment of the invention provides a storage device, wherein a plurality of instructions are stored in the storage device, and the instructions are suitable for being loaded by a processor and executing the steps of the method for identifying malicious behaviors, provided by the embodiment of the invention.
The embodiment of the invention has the beneficial effects that:
according to the method, the device and the storage equipment for identifying the malicious behaviors, whether the malicious behaviors exist in the Office program is identified by monitoring whether the Office program calls a CreateRemoteThread function or not in the starting process; and if the Office program calls the CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program. That is to say, the method, the apparatus, and the storage device for identifying malicious behavior provided in the embodiments of the present invention monitor the API called in the process of starting the Office program, so that the Office file in a specific format constructed by using various vulnerabilities can be detected, and a defect that a document attacked by an overflow vulnerability cannot be detected when detecting whether the Office program includes malicious codes through feature codes is overcome.
Drawings
Fig. 1 is a flowchart of a method for identifying malicious behavior according to an embodiment of the present invention;
fig. 2 is a flowchart of another malicious behavior identification method according to an embodiment of the present invention;
fig. 3 is a block diagram of an apparatus for identifying malicious activities according to an embodiment of the present invention;
fig. 4 is a block diagram of another malicious behavior authentication apparatus according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method, a device and a storage device for identifying malicious behaviors, wherein when it is monitored that an Office program calls a CreateRemoteThread function in the starting process, the malicious behaviors in the Office program are determined. That is to say, the method, the apparatus, and the storage device for identifying malicious behavior provided in the embodiments of the present invention monitor the API called in the process of starting the Office program, so as to detect the Office file in a specific format constructed by using various vulnerabilities, make up for the defect that a document attacked by an overflow vulnerability cannot be detected when detecting whether the Office program contains malicious codes by using the feature codes, and ensure the detection rate when attacking a system by using a buffer overflow vulnerability or an undisclosed 0day vulnerability.
The following describes specific embodiments of a method, an apparatus, and a storage device for identifying malicious behavior according to embodiments of the present invention with reference to the accompanying drawings.
When a plurality of Office documents are opened, a plurality of Office programs are operated in the background and correspond to the Office documents one by one. For example, in a period of time after the icon of the document 1 is double-clicked and before the interface of the document 1 is presented, the Office program 1 corresponding to the document 1 is in a starting process; in a period of time after the icon of the document 2 is double-clicked and before the interface of the document 2 is presented, the Office program 2 corresponding to the document 2 is in a starting process.
Through tests, research personnel find that multithreading is started to carry out early preparation in the normal Office starting process, but all threads in the normal word main process cannot call the createremotetrathreadable function. Because the format of the word document does not write the corresponding shellcode to too much space of a hacker, malicious codes can be injected through a createremotetrathreaded function, so that the system is attacked. Therefore, when the Office program is found to call the createremotetrathreadend function, it can be considered that a malicious behavior exists in the Office program.
Based on this, the method for identifying malicious behavior provided by the embodiment of the present invention, as shown in fig. 1, specifically includes the following steps:
s101, monitoring that an Office program calls and creates a remote thread CreateRemoteThread function in the starting process;
and S102, determining that malicious behaviors exist in the Office program.
In addition, research and development personnel find through tests that various resource allocations can be carried out and early-stage preparation can be carried out in the normal Office starting process, and no process can be started before the system API ShowWindow function is called. And malicious codes often use the vulnerability of the Office program to construct a specific text format, which causes the Office program to start the malicious program pointed by the malicious codes before calling ShowWindow, that is, to start a new process.
Therefore, further, as shown in fig. 2, an identification method of a malicious activity according to an embodiment of the present invention includes:
s201, monitoring whether the Office program calls a CreateRemoteThread function or not in the starting process; if the Office program calls the createremotetethread function in the starting process, executing S202; if the Office program does not call the createremotetethreadable function in the starting process, executing S203;
s202, determining that malicious behaviors exist in the Office program;
s203, monitoring whether a new process is created before a ShowWindow function is called in the starting process of the Office program; if a new process is created before the ShowWindow function is called, S202 is executed; if no new process is created before the ShowWindow function is called, executing S204;
and S204, determining that no malicious behaviors are found in the Office program.
Furthermore, after the fact that the malicious behaviors exist in the Office program is determined, the Office program can be blocked, and the malicious program is prevented from being triggered. Therefore, as shown in fig. 2, the method for identifying malicious behavior according to the embodiment of the present invention further includes:
and S205, prohibiting the Office program from running.
When the malicious behavior identification method provided by the embodiment of the invention is specifically implemented, a monitoring module can monitor the starting process, the thread initialization and the API calling sequence of the Office process; and then the judging module judges whether the corresponding Office document has malicious behaviors according to the monitoring result, and blocks the running of the malicious behaviors by forbidding the operation of the Office program.
Based on the same inventive concept, the embodiment of the present invention further provides an apparatus for identifying malicious behaviors, and as the principle of the problem solved by the apparatus is similar to the method for identifying malicious behaviors, the implementation of the apparatus can refer to the implementation of the method, and repeated details are not repeated.
An embodiment of the present invention further provides an apparatus for identifying a malicious behavior, as shown in fig. 3, including a memory 31 and a processor 32, where the memory 31 is configured to store a plurality of instructions, and the processor 32 is configured to load the instructions stored in the memory 31 to execute:
monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.
The processor 32 is also configured to load instructions stored in the memory 31 to perform:
when the CreateRemoteThread function is not called by the Office program in the starting process, monitoring whether a new process is created before the ShowWindow function is called by the Office program in the starting process;
and if so, determining that malicious behaviors exist in the Office program.
The processor 32 is also configured to load instructions stored in the memory 31 to perform:
determining that no new process is created before a ShowWindow function is called in the starting process of the Office program;
determining that no malicious behavior is found in the Office program.
The processor 32 is also configured to load instructions stored in the memory 31 to perform:
and when determining that malicious behaviors exist in the Office program, prohibiting the Office program from running.
An embodiment of the present invention further provides an apparatus for identifying a malicious behavior, as shown in fig. 4, including:
a monitoring module 41, configured to monitor whether the Office program calls a create remote thread createremotetrathreadlike function in the starting process;
a determining module 42, configured to determine that a malicious behavior exists in the Office program after the Office program calls the createremote thread function in the starting process.
The embodiment of the invention also provides a storage device, wherein a plurality of instructions are stored in the storage device, and the instructions are suitable for being loaded by the processor and executing the steps of the method for identifying the malicious behavior provided by the embodiment of the invention.
Through the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present invention may be implemented by hardware, or by software plus a necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
Those skilled in the art will appreciate that the modules in the devices in the embodiments may be distributed in the devices in the embodiments according to the description of the embodiments, and may be correspondingly changed in one or more devices different from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method for identifying malicious acts, comprising:
monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.
2. The method of claim 1, wherein the Office program does not call a createremotetethreadlike function during startup, the method further comprising:
monitoring whether a new process is created before a ShowWindow function is called in the starting process of the Office program;
and if so, determining that malicious behaviors exist in the Office program.
3. The method of claim 2, wherein the method further comprises:
determining that no new process is created before a ShowWindow function is called in the starting process of the Office program;
determining that no malicious behavior is found in the Office program.
4. The method of claim 1 or 2, wherein the method further comprises:
and when determining that malicious behaviors exist in the Office program, prohibiting the Office program from running.
5. An apparatus for authenticating malicious activities, the apparatus comprising a memory configured to store a plurality of instructions and a processor configured to load the instructions stored in the memory to perform:
monitoring whether an Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and if the Office program calls a CreateRemoteThread function in the starting process, determining that malicious behaviors exist in the Office program.
6. The apparatus of claim 5, wherein the processor is further to load instructions stored in the memory to perform:
when the CreateRemoteThread function is not called by the Office program in the starting process, monitoring whether a new process is created before the ShowWindow function is called by the Office program in the starting process;
and if so, determining that malicious behaviors exist in the Office program.
7. The apparatus of claim 6, wherein the processor is further to load instructions stored in the memory to perform:
determining that no new process is created before a ShowWindow function is called in the starting process of the Office program;
determining that no malicious behavior is found in the Office program.
8. The apparatus of claim 5 or 6, wherein the processor is further to load instructions stored in the memory to perform:
and when determining that malicious behaviors exist in the Office program, prohibiting the Office program from running.
9. An apparatus for authenticating a malicious activity, comprising:
the monitoring module is used for monitoring whether the Office program calls a CreateRemoteThread function for creating a remote thread in the starting process;
and the determining module is used for determining that malicious behaviors exist in the Office program after the Office program calls the CreateRemoteThread function in the starting process.
10. A memory device having stored therein a plurality of instructions adapted to be loaded by a processor and to perform the steps of the method of any of claims 1-4.
CN201810668717.1A 2018-06-26 2018-06-26 Malicious behavior identification method and device and storage device Pending CN110647743A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810668717.1A CN110647743A (en) 2018-06-26 2018-06-26 Malicious behavior identification method and device and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810668717.1A CN110647743A (en) 2018-06-26 2018-06-26 Malicious behavior identification method and device and storage device

Publications (1)

Publication Number Publication Date
CN110647743A true CN110647743A (en) 2020-01-03

Family

ID=69008587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810668717.1A Pending CN110647743A (en) 2018-06-26 2018-06-26 Malicious behavior identification method and device and storage device

Country Status (1)

Country Link
CN (1) CN110647743A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801030A (en) * 2004-12-31 2006-07-12 福建东方微点信息安全有限责任公司 Method for distinguishing baleful program behavior
CN102737188A (en) * 2012-06-27 2012-10-17 北京奇虎科技有限公司 Method and device for detecting malicious webpage
CN104217157A (en) * 2014-07-31 2014-12-17 珠海市君天电子科技有限公司 Anti-vulnerability-exploitation method and system
CN104809391A (en) * 2014-01-26 2015-07-29 华为技术有限公司 Buffer overflow attack detecting device, method and safeguard system
CN105117648A (en) * 2015-07-29 2015-12-02 杭州安恒信息技术有限公司 Detection system and method for 0DAY/malicious document based on virtual machine

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801030A (en) * 2004-12-31 2006-07-12 福建东方微点信息安全有限责任公司 Method for distinguishing baleful program behavior
CN102737188A (en) * 2012-06-27 2012-10-17 北京奇虎科技有限公司 Method and device for detecting malicious webpage
CN104809391A (en) * 2014-01-26 2015-07-29 华为技术有限公司 Buffer overflow attack detecting device, method and safeguard system
CN104217157A (en) * 2014-07-31 2014-12-17 珠海市君天电子科技有限公司 Anti-vulnerability-exploitation method and system
CN105117648A (en) * 2015-07-29 2015-12-02 杭州安恒信息技术有限公司 Detection system and method for 0DAY/malicious document based on virtual machine

Similar Documents

Publication Publication Date Title
US10893068B1 (en) Ransomware file modification prevention technique
EP3430556B1 (en) System and method for process hollowing detection
US7721333B2 (en) Method and system for detecting a keylogger on a computer
RU2530210C2 (en) System and method for detecting malware preventing standard user interaction with operating system interface
US8719935B2 (en) Mitigating false positives in malware detection
RU2571723C2 (en) System and method of reducing load on operating system when executing antivirus application
KR102210627B1 (en) Method, apparatus and system for detecting malicious process behavior
US9465936B2 (en) Systems and methods for detecting return-oriented programming (ROP) exploits
US9372989B2 (en) Robust malware detector
US9158915B1 (en) Systems and methods for analyzing zero-day attacks
US10003606B2 (en) Systems and methods for detecting security threats
JP6680437B2 (en) System and method for detecting unknown vulnerabilities in a computing process
WO2017160760A1 (en) System and method for reverse command shell detection
CN106709325B (en) Method and device for monitoring program
US11288090B1 (en) Methods, systems, and media for injecting code into embedded devices
RU2568285C2 (en) Method and system for analysing operation of software detection rules
EP3337106B1 (en) Identification system, identification device and identification method
JP2009031859A (en) Information collection system and information collection method
US7472288B1 (en) Protection of processes running in a computer system
US9652615B1 (en) Systems and methods for analyzing suspected malware
CN113632432A (en) Method and device for judging attack behavior and computer storage medium
US9552481B1 (en) Systems and methods for monitoring programs
US9483643B1 (en) Systems and methods for creating behavioral signatures used to detect malware
US10360371B1 (en) Systems and methods for protecting automated execution environments against enumeration attacks
US20080028462A1 (en) System and method for loading and analyzing files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103