[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109753791A - Malware detection methods and device - Google Patents

Malware detection methods and device Download PDF

Info

Publication number
CN109753791A
CN109753791A CN201811641802.5A CN201811641802A CN109753791A CN 109753791 A CN109753791 A CN 109753791A CN 201811641802 A CN201811641802 A CN 201811641802A CN 109753791 A CN109753791 A CN 109753791A
Authority
CN
China
Prior art keywords
program
clicking operation
simulation mouse
mouse clicking
simulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811641802.5A
Other languages
Chinese (zh)
Other versions
CN109753791B (en
Inventor
魏狄龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811641802.5A priority Critical patent/CN109753791B/en
Publication of CN109753791A publication Critical patent/CN109753791A/en
Application granted granted Critical
Publication of CN109753791B publication Critical patent/CN109753791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of malware detection methods and devices, which comprises monitors simulation mouse clicking operation and process creation operations;When listening to simulation mouse clicking operation, judge to simulate whether mouse clicking operation is the remote procedure call initiated by IAccessible interface;If simulating mouse clicking operation is the remote procedure call initiated by the IAccessible interface, the filename for the unknown program that the simulation mouse clicking operation is clicked and the Thread Id of remote procedure call originating end are parsed;Judge the unknown program filename whether be target process process path substring;If the substring of the process path of the entitled target process of the file of the unknown program, analyze whether the unknown program is rogue program according to the process ID of the target process, the process path of the target process and the Thread Id.Malware detection methods and device provided by the invention are capable of detecting when to click the rogue program of starting by MSAA technical modelling mouse.

Description

Malware detection methods and device
Technical field
The present invention relates to technical field of data security, and in particular to a kind of malware detection methods and device.
Background technique
With computer being widely used worldwide, means of defence caused by rogue program and software fault also exist Lasting extension.Since rogue program has infectious, replicability and destructiveness, one that puzzlement computer uses is had become Significant problem.Rogue program refers to that any intentional creation is used to execute without permission and the software program of usually harmful act, It, to steal user's confidential information, is finally destroyed operating system of user or is led to other danger by secret implantation custom system Evil occurs.Trapdoor, logic bomb, Trojan Horse, worm, bacterium, virus etc. can be referred to as rogue program.
Rogue program is huge to computer equipment and harm caused by user security risk, thus how to be carried out to rogue program Detection is just particularly important.As the growth of explosion type, the generation and update of feature database and usually lag is presented in rogue program In the generation of rogue program, tradition is more and more unable to do what one wishes in such a way that feature storehouse matching detects rogue program, in It is active defense mechanism occurred.Active defense mechanism is the real-time protection technology independently analyzed based on program behavior, no Using the feature of rogue program as judgment basis, but from the definition of rogue program, directly using program behavior as judgement Foundation, solves the drawbacks of conventional security software can not defend unknown rogue program, technically realizes the master of rogue program Dynamic defence.
However, for clicking starting by MSAA (Microsoft Active Accessibility) technical modelling mouse The operation of rogue program, process chain information that rogue program generates after being activated and user's active normal operation program generate into City chain information is identical, and the starting of rogue program can be mistakenly considered the independent behaviour of user by active defense mechanism.
Summary of the invention
To be solved by this invention is that active defense mechanism can not detect to click starting by MSAA technical modelling mouse The problem of rogue program.
The present invention is achieved through the following technical solutions:
A kind of malware detection methods, comprising:
Monitor simulation mouse clicking operation and process creation operations;
When listening to the simulation mouse clicking operation, judge whether the simulation mouse clicking operation is to pass through The remote procedure call that IAccessible interface is initiated;
If the simulation mouse clicking operation is the remote procedure call initiated by the IAccessible interface, Parse the filename for the unknown program that the simulation mouse clicking operation is clicked and the Thread Id of remote procedure call originating end;
Judge the unknown program filename whether be target process process path substring, the target process is The process of the process creation operations creation listened to after the simulation mouse clicking operation;
If the substring of the process path of the entitled target process of the file of the unknown program, according to the target into The process ID of journey, the process path of the target process and the Thread Id analyze whether the unknown program is malice journey Sequence.
Optionally, the monitoring simulation mouse clicking operation includes:
To the function hooks hook for realizing simulation mouse click executable program original in Program Manager process;With/ Or
To the function hooks hook for realizing simulation mouse click executable program shortcut in Program Manager process.
Optionally, the monitor process creation, which operates, includes:
To the function hooks hook for realizing process creation in Program Manager process.
Optionally, it is described judge the simulation mouse clicking operation whether be initiated by IAccessible interface it is remote The journey invocation of procedure includes:
Stack backtracking is carried out to the simulation mouse clicking operation, obtains the call stack of the simulation mouse clicking operation;
Determine whether the simulation mouse clicking operation is to pass through according to the call stack of the simulation mouse clicking operation The remote procedure call that IAccessible interface is initiated.
Optionally, the filename and remote process tune for the unknown program that the parsing simulation mouse clicking operation is clicked Include: with the Thread Id of originating end
By realizing that the function parameter of the simulation mouse clicking operation obtains the filename of the unknown program;
The Thread Id is obtained by thread environment block.
Optionally, the time of origin that the creation time of the target process subtracts the simulation mouse clicking operation is less than pre- If the time difference.
Optionally, described according to the process ID of the target process, the process path of the target process and described Thread Id is analyzed after whether the unknown program be rogue program, further includes:
If the unknown program is rogue program, warning information is generated.
Optionally, after the generation warning information, further includes:
The warning information is sent by one of mail, short message, dialog box and instant messaging or multiple combinations To the user.
Based on same inventive concept, the present invention also provides a kind of rogue program detection devices, comprising:
First monitors module, for monitoring simulation mouse clicking operation;
Second monitors module, for monitor process creation operation;
First judgment module, for when listening to the simulation mouse clicking operation, judging that the simulation mouse is clicked Whether operation is the remote procedure call initiated by IAccessible interface;
Parsing module, for remote to be initiated by the IAccessible interface in the simulation mouse clicking operation When the journey invocation of procedure, the filename and remote procedure call for parsing the unknown program that the simulation mouse clicking operation is clicked are initiated The Thread Id at end;
Second judgment module, for judge the unknown program filename whether be target process process path son String, the target process be it is described simulation mouse clicking operation after listen to the process creation operations creation into Journey;
Analysis module, when the substring of the process path for the entitled target process of the file in the unknown program, The unknown program is analyzed according to the process ID of the target process, the process path of the target process and the Thread Id It whether is rogue program.
Optionally, the first monitoring module includes:
First knock-down module, for clicking executable program original to realization simulation mouse in Program Manager process Function hooks hook;And/or
Second knock-down module, for clicking executable program shortcut to realization simulation mouse in Program Manager process Function hooks hook.
Optionally, the second monitoring module includes:
Third knock-down module, for the function hooks hook for realizing process creation in Program Manager process.
Optionally, the first judgment module includes:
Call stack obtains module, for carrying out stack backtracking to the simulation mouse clicking operation, obtains the simulation mouse The call stack of clicking operation;
Determining module, for determining the simulation mouse clicking operation according to the call stack of the simulation mouse clicking operation It whether is the remote procedure call initiated by IAccessible interface.
Optionally, the parsing module includes:
Filename obtains module, obtains for the function parameter by realizing the simulation mouse clicking operation described unknown The filename of program;
Thread Id obtains module, for obtaining the Thread Id by thread environment block.
Optionally, the time of origin that the creation time of the target process subtracts the simulation mouse clicking operation is less than pre- If the time difference.
Optionally, the rogue program detection device further include:
Warning information generation module, for generating warning information when the unknown program is rogue program.
Optionally, the rogue program detection device further include:
Sending module, will be described for passing through one of mail, short message, dialog box and instant messaging or multiple combinations Warning information is sent to the user.
Based on same inventive concept, the present invention also provides a kind of computer readable storage mediums, are stored thereon with calculating Machine program, the computer program realize above-mentioned malware detection methods when being executed by processor.
Based on same inventive concept, the present invention also provides a kind of computer equipment, including memory, processor and deposit The computer program that can be run on a memory and on the processor is stored up, when the processor executes the computer program Realize above-mentioned malware detection methods.
Compared with prior art, the present invention having the following advantages and benefits:
Malware detection methods and device provided by the invention judge institute when listening to simulation mouse clicking operation State whether simulation mouse clicking operation is the remote procedure call initiated by IAccessible interface;If the simulation mouse Clicking operation is the remote procedure call initiated by the IAccessible interface, then parses the simulation mouse and click behaviour Make the filename for the unknown program clicked and the Thread Id of remote procedure call originating end;Judge the filename of the unknown program Whether be target process process path substring, the target process be listened to after the simulation mouse clicking operation The process creation operations creation process;If the process path of the entitled target process of the file of the unknown program Substring, then according to the analysis of the process ID of the target process, the process path of the target process and the Thread Id Whether unknown program is rogue program.Due to malware detection methods provided by the invention and device, pass through listening to IAccessible interface initiate remote procedure call simulation mouse clicking operation when, be according to be the simulation mouse point The process ID for hitting operation creation, the process path and remote procedure call originating end created for the simulation mouse clicking operation Thread Id comprehensive analysis described in unknown program whether be rogue program, rather than according only to the unknown program run when father Process judges whether the unknown program is rogue program, it is thus achieved that disliking to starting is clicked by MSAA technical modelling mouse The detection for program of anticipating.
Detailed description of the invention
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application Point, do not constitute the restriction to the embodiment of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the malware detection methods of the embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the rogue program detection device of the embodiment of the present invention.
Specific embodiment
The full name of MSAA is Microsoft Active Accessibility, and technology model is to pass through user interface (UI, User Interface) program can expose an IAccessible interface, another program is facilitated to control it System.The original intention of MSAA technology is that disabled person can also be borrowed using Windows program, user interface automatic test for convenience This technology, however, the IAccessible interface that MSAA is exposed also brings opportunity to rogue program.With C packing There are for the rogue program of file entitled " a.exe " under catalogue, started by MSAA technical modelling mouse clicking operation Journey is as follows: firstly, opening C packing catalogue;Then the window handle of C packing directory window is obtained;Then the window handle is obtained Corresponding IAccessible interface;IEnumVARIANT is obtained according to the corresponding IAccessible interface of the window handle to connect Mouthful;All UI elements of the window handle are traversed by IEnumVARIANT interface, and obtain the filename of each UI element;It will be every The filename of the UI element obtained when secondary traversal and the filename " a.exe " of the rogue program carry out character string comparison, so that it may To obtain the corresponding IAccessible interface of the rogue program, there is this interface that can start the rogue program, Exactly the rogue program is started by simulating mouse clicking operation.
Existing active defense mechanism is according to the parent process judgement when operation of the unknown program of doubtful rogue program Whether unknown program is rogue program: if the parent process of the unknown program is Program Manager process, then it is assumed that described unknown Program is the program that user actively opens, and not will do it alarm;If the parent process of the unknown program be not Program Manager into Journey, then it is assumed that the program that the unknown program not instead of user actively opens has the other process initiation unknown journey Sequence, at this time it is considered that the unknown program is rogue program.But for example assume the journey for having a file entitled " f.exe " Sequence starts the rogue program of file entitled " a.exe " by MSAA technical modelling mouse clicking operation, then file is entitled The parent process of the rogue program of " a.exe " is exactly Program Manager process, is actually sent out by the program of file entitled " f.exe " It rises, has thus bypassed the detection of active defense mechanism.Based on this, the present invention provides a kind of malware detection methods and dress It sets, realizes the detection to starting rogue program is clicked by MSAA technical modelling mouse.
To make the objectives, technical solutions, and advantages of the present invention clearer, below with reference to embodiment and attached drawing, to this Invention is described in further detail, and exemplary embodiment of the invention and its explanation for explaining only the invention, are not made For limitation of the invention.
Embodiment 1
The present embodiment provides a kind of malware detection methods, Fig. 2 is the flow chart of the malware detection methods, institute Stating malware detection methods includes step S11 to step S15.
Step S11 monitors simulation mouse clicking operation and process creation operations.
Specifically, by the function hooks hook to realization simulation mouse click in Program Manager process to the simulation Mouse clicking operation is monitored.It is executable program original that due to the simulation, mouse clicking operation, which may be clicked, What may be clicked is executable program shortcut, thus monitoring simulation mouse clicking operation can be to Program Manager Realize that simulation mouse clicks the function hooks hook of executable program original in process, i.e., in Program Manager process SendInput () function hooks hook derived from user32.dll is also possible to realization simulation mouse in Program Manager process Punctuate hits the function hooks hook of executable program shortcut, i.e. one to the shell32.dll in Program Manager process IContextMenu::InvokeCommand () function hooks hook in a com interface, can also be certainly while to journey Realizing the function of simulation mouse click executable program original in sequence manager process and realizing that simulation mouse is clicked can be performed The function hooks hook of program bar.Rogue program due to clicking starting by MSAA technical modelling mouse is by program The API of the function of manager process calling process creation starts, thus by realizing process in Program Manager process The function hooks hook of creation monitors the process creation operations, so that obtaining is that the simulation mouse clicking operation is created The process path built.
Step S12, when listening to the simulation mouse clicking operation, judge the simulation mouse clicking operation whether be The remote procedure call initiated by IAccessible interface.
Specifically, stack backtracking is carried out to the simulation mouse clicking operation, obtains the tune of the simulation mouse clicking operation Use stack.If what the simulation mouse clicking operation was clicked is executable program original, in Program Manager process SendInput () function derived from user32.dll carries out stack backtracking;If what the simulation mouse clicking operation was clicked is that can hold Line program shortcut, then in a com interface of the shell32.dll in Program Manager process IContextMenu::InvokeCommand () function carries out stack backtracking.By taking function A calls function B as an example, stack recalls principle Are as follows: the EBP value (i.e. the stack plot of function B) of called function B is exactly the memory first address for storing the EBP value of homophony function A, Assuming that being recalled from function B, the EBP value of homophony function A is obtained by the EBP value of function B, is prepared for backtracking upwards, In addition the return address being located next on memory is taken out, can be obtained by return address and be located at which homophony function suffers, then Recall the address that can be obtained caller upwards again using the EBP value of function A.Due to the address of caller each in system and each Corresponding relationship between the module name of a caller be it is determining, after the address for obtaining the caller, according to the calling Call by location GetModuleHandleExW () function of person can obtain the module name of the caller.Obtain the tune Behind the address of user and the module name of the caller after, that is, obtain it is described simulation mouse clicking operation call stack it Afterwards, determine whether the simulation mouse clicking operation is to pass through according to the call stack of the simulation mouse clicking operation The remote procedure call that IAccessible interface is initiated, the call stack of the even described simulation mouse clicking operation meet following Call stack:
UIAutomationCore
UIAutomationCore
UIAutomationCore
oleacc
oleacc
rpcrt4
rpcrt4
ole32
ole32
Ole32
Then determine that the simulation mouse clicking operation is the remote procedure call initiated by IAccessible interface.
If the simulation mouse clicking operation is the remote procedure call initiated by the IAccessible interface, Step S13 is executed, the filename and remote procedure call for parsing the unknown program that the simulation mouse clicking operation is clicked are initiated The Thread Id at end.
Specifically, by realizing that the function parameter of the simulation mouse clicking operation obtains the file of the unknown program Name.If what the simulation mouse clicking operation was clicked is executable program original, by Program Manager process The filename of unknown program described in the gain of parameter of SendInput () function derived from user32.dll;If the simulation mouse What clicking operation was clicked is executable program shortcut, then passes through one of the shell32.dll in Program Manager process IContextMenu::InvokeCommand () function in com interface obtains the filename of the unknown program.Long-range mistake Journey calls the Thread Id of originating end that can obtain by thread environment block, i.e., thread environment block -> ReservedForOle is directed toward Data are the Thread Id at the+0x0034 offset of structure.
Step S14, judge the unknown program filename whether be target process process path substring, the mesh Mark process is the process of the process creation operations creation listened to after the simulation mouse clicking operation.
After simulation mouse clicking operation generation, Program Manager process can be created for the simulation mouse clicking operation Build process.By judge the unknown program filename whether be the target process process path substring, can obtain Calling program manager process is the process of the simulation mouse clicking operation creation.The filename of the judgement unknown program Whether be the target process process path substring, be by the filename of the unknown program and the target process Process path is matched.If the corresponding character string of the process path of the target process includes the filename of the unknown program Corresponding character string, the then substring of the process path of the entitled target process of the file of the unknown program.Further, due to It, will not be to the simulation mouse point under the abnormal conditions such as function hooks hook for realizing process creation in Program Manager process Hit operation creation process, can be set the target process creation time subtract it is described simulation mouse clicking operation generation when Between be less than preset time it is poor, i.e., the described target process be it is described simulation mouse clicking operation time of origin after it is default when Between difference in create.The preset time difference can be configured according to system processing speed: system processing speed is faster, described Preset time difference can be set smaller, and the preset time difference is set as 1S in the present embodiment.
If the substring of the process path of the entitled target process of the file of the unknown program, thens follow the steps S15, root Analyzing the unknown program according to the process ID of the target process, the process path of the target process and the Thread Id is No is rogue program.
If the substring of the process path of the entitled target process of the file of the unknown program, the target process are It is that the simulation mouse clicking operation creates process for Program Manager process, according to the process ID of the target process, described The process path of target process and the Thread Id carry out catena analysis, i.e., with the process ID of the target process, the mesh The process path of mark process and the Thread Id compare the rule of local virus base or cloud to determine the unknown journey Whether sequence is rogue program.If the process path and the Thread Id of the process ID of the target process, the target process With the rule match of local virus base or cloud, it is determined that the unknown program is rogue program.It should be noted that this Field technical staff knows how the process path and the thread of the process ID with the target process, the target process The rule of ID comparison local virus base or cloud, the present embodiment is to this without excessively illustrating.
Further, if the unknown program is rogue program, warning information is generated, the warning information is used for prompting There are rogue programs for the computer equipment at family.After generating the warning information, the warning information can also be sent to The user.For example, the warning information can be sent to specified email address by way of mail, can also pass through The warning information is sent to specified mobile terminal by the mode of short message, can also directly calculated by way of dialog box Machine equipment shows the warning information, the warning information can also be sent to the user by way of instant messaging. Of course, it is possible to the warning information is sent to by the user using any one of the above mode, it can also be using any several The warning information is sent to the user by the combination of mode.
Malware detection methods provided in this embodiment, listen to initiated by IAccessible interface it is long-range When the simulation mouse clicking operation of the invocation of procedure, it is according to the process ID created for the simulation mouse clicking operation, is described It simulates unknown described in the process path of mouse clicking operation creation and the Thread Id comprehensive analysis of remote procedure call originating end Whether program is rogue program, rather than according only to the unknown program run when parent process whether judge the unknown program For rogue program, it is thus achieved that the detection to starting rogue program is clicked by MSAA technical modelling mouse.
Embodiment 2
Based on same inventive concept, the present embodiment provides a kind of rogue program detection device, the rogue program detection Device includes:
First monitors module 21, for monitoring simulation mouse clicking operation;
Second monitors module 22, for monitor process creation operation;
First judgment module 23, for when listening to the simulation mouse clicking operation, judging the simulation mouse point Hit whether operation is the remote procedure call initiated by IAccessible interface;
Parsing module 24, for being to be initiated by the IAccessible interface in the simulation mouse clicking operation When remote procedure call, the filename and remote procedure call hair of the unknown program that the simulation mouse clicking operation is clicked are parsed The Thread Id of origin or beginning;
Second judgment module 25, for judge the unknown program filename whether be target process process path Substring, the target process be it is described simulation mouse clicking operation after listen to the process creation operations creation into Journey;
Analysis module 26, the substring of the process path for the entitled target process of the file in the unknown program When, it is analyzed according to the process ID of the target process, the process path of the target process and the Thread Id described unknown Whether program is rogue program.
Further, the first monitoring module 21 includes:
First knock-down module, for clicking executable program original to realization simulation mouse in Program Manager process Function hooks hook;And/or
Second knock-down module, for clicking executable program shortcut to realization simulation mouse in Program Manager process Function hooks hook.
Further, the second monitoring module 22 includes:
Third knock-down module, for the function hooks hook for realizing process creation in Program Manager process.
Further, the first judgment module 23 includes:
Call stack obtains module, for carrying out stack backtracking to the simulation mouse clicking operation, obtains the simulation mouse The call stack of clicking operation;
Determining module, for determining the simulation mouse clicking operation according to the call stack of the simulation mouse clicking operation It whether is the remote procedure call initiated by IAccessible interface.
Further, the parsing module 24 includes:
Filename obtains module, obtains for the function parameter by realizing the simulation mouse clicking operation described unknown The filename of program;
Thread Id obtains module, for obtaining the Thread Id by thread environment block.
Further, the time of origin that the creation time of the target process subtracts the simulation mouse clicking operation is less than pre- If the time difference.
Further, the rogue program detection device further include:
Warning information generation module, for generating warning information when the unknown program is rogue program.
Further, the rogue program detection device further include:
Sending module, will be described for passing through one of mail, short message, dialog box and instant messaging or multiple combinations Warning information is sent to the user.
The concrete operating principle of the rogue program detection device can refer in embodiment 1 for step S11 to step S15 Description, details are not described herein for the present embodiment.
Embodiment 3
Based on same inventive concept, the present embodiment provides a kind of computer readable storage mediums, are stored thereon with calculating Machine program, if the malware detection methods that the embodiment of the present invention 1 provides are realized in the form of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally The all or part of the process in the malware detection methods that embodiment 1 provides is realized in invention, can also pass through computer program It is completed to instruct relevant hardware, the computer program can be stored in a computer readable storage medium, the computer Program is when being executed by processor, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes meter Calculation machine program code, the computer program code can be source code form, object identification code form, executable file or certain Intermediate form etc..The computer-readable medium may include: can carry the computer program code any entity or Device, medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software Distribution medium etc..It should be noted that the content that the computer-readable medium includes can be according to making laws in jurisdiction Requirement with patent practice carries out increase and decrease appropriate, such as in certain jurisdictions, according to legislation and patent practice, computer Readable medium does not include electric carrier signal and telecommunication signal.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.
The invention discloses A1, a kind of malware detection methods, comprising:
Monitor simulation mouse clicking operation and process creation operations;
When listening to the simulation mouse clicking operation, judge whether the simulation mouse clicking operation is to pass through The remote procedure call that IAccessible interface is initiated;
If the simulation mouse clicking operation is the remote procedure call initiated by the IAccessible interface, Parse the filename for the unknown program that the simulation mouse clicking operation is clicked and the Thread Id of remote procedure call originating end;
Judge the unknown program filename whether be target process process path substring, the target process is The process of the process creation operations creation listened to after the simulation mouse clicking operation;
If the substring of the process path of the entitled target process of the file of the unknown program, according to the target into The process ID of journey, the process path of the target process and the Thread Id analyze whether the unknown program is malice journey Sequence.
A2, malware detection methods according to a1, the monitoring simulation mouse clicking operation include:
To the function hooks hook for realizing simulation mouse click executable program original in Program Manager process;With/ Or
To the function hooks hook for realizing simulation mouse click executable program shortcut in Program Manager process.
A3, malware detection methods according to a1, the monitor process creation operation include:
To the function hooks hook for realizing process creation in Program Manager process.
A4, malware detection methods according to a1, it is described to judge whether the simulation mouse clicking operation is logical Crossing the remote procedure call that IAccessible interface is initiated includes:
Stack backtracking is carried out to the simulation mouse clicking operation, obtains the call stack of the simulation mouse clicking operation;
Determine whether the simulation mouse clicking operation is to pass through according to the call stack of the simulation mouse clicking operation The remote procedure call that IAccessible interface is initiated.
A5, malware detection methods according to a1, the parsing simulation mouse clicking operation are clicked not The Thread Id of the filename and remote procedure call originating end of knowing program includes:
By realizing that the function parameter of the simulation mouse clicking operation obtains the filename of the unknown program;
The Thread Id is obtained by thread environment block.
A6, malware detection methods according to a1, the creation time of the target process subtract the simulation mouse The time of origin for marking clicking operation is poor less than preset time.
A7, malware detection methods according to a1, in the process ID according to the target process, the mesh The process path of mark process and the Thread Id are analyzed after whether the unknown program be rogue program, further includes:
If the unknown program is rogue program, warning information is generated.
A8, the malware detection methods according to A7, after the generation warning information, further includes:
The warning information is sent by one of mail, short message, dialog box and instant messaging or multiple combinations To the user.
The invention also discloses B9, a kind of rogue program detection device, comprising:
First monitors module, for monitoring simulation mouse clicking operation;
Second monitors module, for monitor process creation operation;
First judgment module, for when listening to the simulation mouse clicking operation, judging that the simulation mouse is clicked Whether operation is the remote procedure call initiated by IAccessible interface;
Parsing module, for remote to be initiated by the IAccessible interface in the simulation mouse clicking operation When the journey invocation of procedure, the filename and remote procedure call for parsing the unknown program that the simulation mouse clicking operation is clicked are initiated The Thread Id at end;
Second judgment module, for judge the unknown program filename whether be target process process path son String, the target process be it is described simulation mouse clicking operation after listen to the process creation operations creation into Journey;
Analysis module, when the substring of the process path for the entitled target process of the file in the unknown program, The unknown program is analyzed according to the process ID of the target process, the process path of the target process and the Thread Id It whether is rogue program.
B10, the rogue program detection device according to B9, the first monitoring module include:
First knock-down module, for clicking executable program original to realization simulation mouse in Program Manager process Function hooks hook;And/or
Second knock-down module, for clicking executable program shortcut to realization simulation mouse in Program Manager process Function hooks hook.
B11, the rogue program detection device according to B9, the second monitoring module include:
Third knock-down module, for the function hooks hook for realizing process creation in Program Manager process.
B12, the rogue program detection device according to B9, the first judgment module include:
Call stack obtains module, for carrying out stack backtracking to the simulation mouse clicking operation, obtains the simulation mouse The call stack of clicking operation;
Determining module, for determining the simulation mouse clicking operation according to the call stack of the simulation mouse clicking operation It whether is the remote procedure call initiated by IAccessible interface.
B13, the malware detection methods according to B9, the parsing module include:
Filename obtains module, obtains for the function parameter by realizing the simulation mouse clicking operation described unknown The filename of program;
Thread Id obtains module, for obtaining the Thread Id by thread environment block.
B14, the rogue program detection device according to B9, the creation time of the target process subtract the simulation mouse The time of origin for marking clicking operation is poor less than preset time.
B15, the rogue program detection device according to B9, further includes:
Warning information generation module, for generating warning information when the unknown program is rogue program.
B16, the rogue program detection device according to B15, further includes:
Sending module, will be described for passing through one of mail, short message, dialog box and instant messaging or multiple combinations Warning information is sent to the user.
The invention also discloses C17, a kind of computer readable storage medium, are stored thereon with computer program, the meter A1 to A8 described in any item malware detection methods are realized when calculation machine program is executed by processor.
The invention also discloses D18, a kind of computer equipment, including memory, processor and storage are on a memory And the computer program that can be run on the processor, the processor realize that A1 to A8 appoints when executing the computer program Malware detection methods described in one.

Claims (10)

1. a kind of malware detection methods characterized by comprising
Monitor simulation mouse clicking operation and process creation operations;
When listening to the simulation mouse clicking operation, judge whether the simulation mouse clicking operation is to pass through The remote procedure call that IAccessible interface is initiated;
If the simulation mouse clicking operation is the remote procedure call initiated by the IAccessible interface, parse The filename for the unknown program that the simulation mouse clicking operation is clicked and the Thread Id of remote procedure call originating end;
Judge the unknown program filename whether be target process process path substring, the target process is in institute State the process of the process creation operations creation listened to after simulation mouse clicking operation;
If the substring of the process path of the entitled target process of the file of the unknown program, according to the target process Process ID, the process path of the target process and the Thread Id analyze whether the unknown program is rogue program.
2. malware detection methods according to claim 1, which is characterized in that mouse clicking operation is simulated in the monitoring Include:
To the function hooks hook for realizing simulation mouse click executable program original in Program Manager process;And/or
To the function hooks hook for realizing simulation mouse click executable program shortcut in Program Manager process.
3. malware detection methods according to claim 1, which is characterized in that the monitor process creation operation packet It includes:
To the function hooks hook for realizing process creation in Program Manager process.
4. malware detection methods according to claim 1, which is characterized in that the judgement simulation mouse is clicked Whether operation is that the remote procedure call initiated by IAccessible interface includes:
Stack backtracking is carried out to the simulation mouse clicking operation, obtains the call stack of the simulation mouse clicking operation;
Determine whether the simulation mouse clicking operation is to pass through according to the call stack of the simulation mouse clicking operation The remote procedure call that IAccessible interface is initiated.
5. malware detection methods according to claim 1, which is characterized in that the parsing simulation mouse is clicked It operates the filename of unknown program clicked and the Thread Id of remote procedure call originating end includes:
By realizing that the function parameter of the simulation mouse clicking operation obtains the filename of the unknown program;
The Thread Id is obtained by thread environment block.
6. malware detection methods according to claim 1, which is characterized in that the creation time of the target process subtracts The time of origin of the simulation mouse clicking operation is gone to be less than preset time poor.
7. malware detection methods according to claim 1, which is characterized in that described according to the target process Process ID, the process path of the target process and the Thread Id analyze the unknown program whether be rogue program it Afterwards, further includes:
If the unknown program is rogue program, warning information is generated.
8. a kind of rogue program detection device characterized by comprising
First monitors module, for monitoring simulation mouse clicking operation;
Second monitors module, for monitor process creation operation;
First judgment module, for when listening to the simulation mouse clicking operation, judging the simulation mouse clicking operation It whether is the remote procedure call initiated by IAccessible interface;
Parsing module, for being the long-range mistake initiated by the IAccessible interface in the simulation mouse clicking operation Journey tune used time, the parsing filename for simulating the unknown program that mouse clicking operation is clicked and remote procedure call originating end Thread Id;
Second judgment module, for judge the unknown program filename whether be target process process path substring, The target process is the process of the process creation operations creation listened to after the simulation mouse clicking operation;
Analysis module, when the substring of the process path for the entitled target process of the file in the unknown program, according to Whether the process ID of the target process, the process path of the target process and the Thread Id analyze the unknown program For rogue program.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt Claim 1 to 7 described in any item malware detection methods are realized when processor executes.
10. a kind of computer equipment, including memory, processor and storage can transport on a memory and on the processor Capable computer program, which is characterized in that the processor realizes that claim 1 to 7 is any when executing the computer program Malware detection methods described in.
CN201811641802.5A 2018-12-29 2018-12-29 Malicious program detection method and device Active CN109753791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811641802.5A CN109753791B (en) 2018-12-29 2018-12-29 Malicious program detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811641802.5A CN109753791B (en) 2018-12-29 2018-12-29 Malicious program detection method and device

Publications (2)

Publication Number Publication Date
CN109753791A true CN109753791A (en) 2019-05-14
CN109753791B CN109753791B (en) 2024-07-26

Family

ID=66404490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811641802.5A Active CN109753791B (en) 2018-12-29 2018-12-29 Malicious program detection method and device

Country Status (1)

Country Link
CN (1) CN109753791B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112131565A (en) * 2020-09-27 2020-12-25 浙江华途信息安全技术股份有限公司 Transparent encryption and decryption anti-cracking method and management equipment thereof
CN112380540A (en) * 2020-11-13 2021-02-19 武汉虹旭信息技术有限责任公司 Android application security detection method and device
CN113360913A (en) * 2021-08-10 2021-09-07 杭州安恒信息技术股份有限公司 Malicious program detection method and device, electronic equipment and storage medium
CN114465752A (en) * 2021-12-10 2022-05-10 奇安信科技集团股份有限公司 Remote call detection method and device, electronic equipment and storage medium
CN114465753A (en) * 2021-12-10 2022-05-10 奇安信科技集团股份有限公司 Remote operation behavior identification method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082733A1 (en) * 2008-09-30 2010-04-01 Microsoft Corporation Extensible remote programmatic access to user interface
CN106557701A (en) * 2016-11-28 2017-04-05 北京奇虎科技有限公司 kernel leak detection method and device based on virtual machine
CN106682513A (en) * 2016-11-28 2017-05-17 北京奇虎科技有限公司 Detection method for target sample file and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082733A1 (en) * 2008-09-30 2010-04-01 Microsoft Corporation Extensible remote programmatic access to user interface
CN106557701A (en) * 2016-11-28 2017-04-05 北京奇虎科技有限公司 kernel leak detection method and device based on virtual machine
CN106682513A (en) * 2016-11-28 2017-05-17 北京奇虎科技有限公司 Detection method for target sample file and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHAO SHEN等: "Performance evaluation of anomaly-detection algorithms for mouse dynamics", pages 1 - 16, Retrieved from the Internet <URL:《网页在线公开:https://www.sciencedirect.com/science/article/pii/S0167404814000807》> *
党华等: "Linux系统中基于系统调用序列的病毒检测方法研究", 《计算机工程与应用》, 14 April 2005 (2005-04-14), pages 129 - 131 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112131565A (en) * 2020-09-27 2020-12-25 浙江华途信息安全技术股份有限公司 Transparent encryption and decryption anti-cracking method and management equipment thereof
CN112380540A (en) * 2020-11-13 2021-02-19 武汉虹旭信息技术有限责任公司 Android application security detection method and device
CN113360913A (en) * 2021-08-10 2021-09-07 杭州安恒信息技术股份有限公司 Malicious program detection method and device, electronic equipment and storage medium
CN114465752A (en) * 2021-12-10 2022-05-10 奇安信科技集团股份有限公司 Remote call detection method and device, electronic equipment and storage medium
CN114465753A (en) * 2021-12-10 2022-05-10 奇安信科技集团股份有限公司 Remote operation behavior identification method and device, electronic equipment and storage medium
CN114465752B (en) * 2021-12-10 2024-06-28 奇安信科技集团股份有限公司 Remote call detection method and device, electronic equipment and storage medium
CN114465753B (en) * 2021-12-10 2024-06-28 奇安信科技集团股份有限公司 Remote operation behavior recognition method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109753791B (en) 2024-07-26

Similar Documents

Publication Publication Date Title
CN109753791A (en) Malware detection methods and device
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
CN109067815B (en) Attack event tracing analysis method, system, user equipment and storage medium
CN105989283B (en) A kind of method and device identifying virus mutation
CN105264861B (en) Method and apparatus for detecting multistage event
US9306889B2 (en) Method and device for processing messages
AU2015203069B2 (en) Deception network system
CN106650436B (en) A kind of safety detection method and device based on local area network
CN109753806A (en) Server protection method and device
CN108664793B (en) Method and device for detecting vulnerability
US20170061126A1 (en) Process Launch, Monitoring and Execution Control
CN110717183B (en) Virus checking and killing method, device, equipment and storage medium
CN103632096A (en) Method and device for carrying out safety detection on equipment
CN107426231B (en) Method and device for identifying user behavior
CN105512045B (en) Application program testing method and device and testing equipment
US9479521B2 (en) Software network behavior analysis and identification system
CN110099044A (en) Cloud Host Security detection system and method
CN109074454A (en) Malware is grouped automatically based on artefact
CN103581185A (en) Cloud searching and killing method, device and system for resisting anti-antivirus test
CN109144023A (en) A kind of safety detection method and equipment of industrial control system
CN112153062A (en) Multi-dimension-based suspicious terminal equipment detection method and system
CN105205398B (en) It is a kind of that shell side method is looked into based on APK shell adding software dynamic behaviours
CN110135162A (en) The recognition methods of the back door WEBSHELL, device, equipment and storage medium
CN105978904A (en) Intrusion detect system and electronic device
CN108040036A (en) A kind of industry cloud Webshell safety protecting methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant