Stack execution detection in a sandbox environment

    公开(公告)号:US11816203B2

    公开(公告)日:2023-11-14

    申请号:US17456257

    申请日:2021-11-23

    申请人: Malwarebytes Inc.

    摘要: An anti-malware system monitors the emulation of a suspicious program in a sandbox environment. The anti-malware system determines that the suspicious program is attempting to access a restricted area of memory (e.g., an executable instruction in the restricted area). Rather than stop the emulation, the anti-malware system can temporarily pause the emulation of the suspicious program. During this pause, the anti-malware system can determine whether the suspicious program is containable within the sandbox environment. If the anti-malware system determines that the emulation of the executable instruction is safe (e.g., that the program is containable), the anti-malware system will resume emulation. If the anti-malware system determines that the emulation of the executable instruction is not safe, the anti-malware system may shut down emulation.

    Exception handlers in a sandbox environment for malware detection

    公开(公告)号:US11797676B2

    公开(公告)日:2023-10-24

    申请号:US17411833

    申请日:2021-08-25

    申请人: Malwarebytes Inc.

    发明人: Jason Neal Raber

    IPC分类号: G06F21/00 G06F21/56 G06F21/53

    摘要: An anti-malware application can emulate a suspicious program in a sandbox environment and retrieve any exception handlers the suspicious program attempts to register with the operation system. When the suspicious program triggers an exception, the anti-malware application can save a current context of the suspicious program being emulated. To emulate the handling of the exception, the anti-malware application can validate an exception handler chain including one or more exception handlers added by the suspicious program. The anti-malware application can then select and emulate an exception handler based on the saved context of the suspicious program at the time the exception was triggered. If the first exception handler is successful at resolving the exception, the anti-malware application can then save an updated post-exception context and continue emulation of the suspicious program based on the result of the first exception handler.

    EXCEPTION HANDLERS IN A SANDBOX ENVIRONMENT FOR MALWARE DETECTION

    公开(公告)号:US20220245247A1

    公开(公告)日:2022-08-04

    申请号:US17411833

    申请日:2021-08-25

    申请人: Malwarebytes Inc.

    发明人: Jason Neal Raber

    IPC分类号: G06F21/56 G06F21/53

    摘要: An anti-malware application can emulate a suspicious program in a sandbox environment and retrieve any exception handlers the suspicious program attempts to register with the operation system. When the suspicious program triggers an exception, the anti-malware application can save a current context of the suspicious program being emulated. To emulate the handling of the exception, the anti-malware application can validate an exception handler chain including one or more exception handlers added by the suspicious program. The anti-malware application can then select and emulate an exception handler based on the saved context of the suspicious program at the time the exception was triggered. If the first exception handler is successful at resolving the exception, the anti-malware application can then save an updated post-exception context and continue emulation of the suspicious program based on the result of the first exception handler.

    MALWARE INFECTION PREDICTION AND PREVENTION

    公开(公告)号:US20220239670A1

    公开(公告)日:2022-07-28

    申请号:US17369624

    申请日:2021-07-07

    申请人: Malwarebytes Inc.

    IPC分类号: H04L29/06 G06N5/04 G06N20/00

    摘要: A malware infection prediction method predicts a likelihood that a client device is to be infected with in a period of time based on state and behavior telemetry data. A malware infection prediction system receives telemetry data associated with use (i.e. behavior data) and configuration (i.e. state data) of a client device. By using a trained model, the system predicts a likelihood of the client device becoming infected within a given time frame. Based on the predicted likelihood, the system generates recommendations including recommended actions for reducing the likelihood of the client device becoming infected. The system then generates notifications including the recommendations and sends the notifications to the client device or to an administrative account associated with the client device.

    KERNEL BASED EXPLOITATION DETECTION AND PREVENTION USING GRAMMATICALLY STRUCTURED RULES

    公开(公告)号:US20220237286A1

    公开(公告)日:2022-07-28

    申请号:US17161497

    申请日:2021-01-28

    申请人: Malwarebytes Inc.

    IPC分类号: G06F21/55 G06F21/54 G06F21/56

    摘要: An anti-exploitation application identifies and prevents a malicious action from occurring on a client. To do so, a monitoring system instantiated on the kernel of the operating system of the client. The monitoring system stores information describing actions taken by the processor. When the monitoring system detects a triggering action, it sends the triggering action to the anti-exploitation application to determine whether the triggering action is an exploitation action. The anti-exploitation application accesses an evidence set for the triggering action and its related actions. The anti-exploitation application generates an execution hierarchy defining the hierarchical relationships between the triggering action and its related actions and tests the hierarchy against a ruleset of grammatically structured rules. If a grammatically structured rule in the ruleset indicates that the triggering action is an exploitation action, the anti-exploitation application takes a prevention action.

    DETECTION AND REMOVAL OF UNWANTED APPLICATIONS

    公开(公告)号:US20180309793A1

    公开(公告)日:2018-10-25

    申请号:US15787593

    申请日:2017-10-18

    申请人: Malwarebytes Inc.

    IPC分类号: H04L29/06

    摘要: A protection application detects and removes unwanted applications. The protection application scans a client device for suspected unwanted applications. A security server provides an application rating for detected applications to the client device. The application rating is generated based on application retention data received from client devices indicating whether users of the clients choose to remove or retain the application when given the option. The application retention data may be weighed based on a categorization of the clients providing the application retention data into to clients expected to have different reliability levels. The security server can also provide a definition specifying all known components associated with a suspected unwanted application. Responsive to a selection to remove a suspected unwanted application, the protection application uninstalls all components of the application.

    Cloud Ransomware Protection
    7.
    发明公开

    公开(公告)号:US20240259424A1

    公开(公告)日:2024-08-01

    申请号:US18301145

    申请日:2023-04-14

    申请人: Malwarebytes Inc.

    IPC分类号: H04L9/40

    CPC分类号: H04L63/1466 H04L63/1416

    摘要: A newly created or modified object is sent to a networked local or remote server for analysis. While the object is being analyzed for vulnerabilities, the object is locked and made inaccessible to users, devices, and networks. If the object is identified as malicious, it may be marked for review, deleted, placed in quarantine, or have its permissions changed so that it cannot cause harm by propagating through the environment. Conversely, if the object is identified as safe, the risk of ransomware attacks may also be mitigated by replicating the object across multiple cloud storage platforms.

    Intelligent Pop-Up Blocker
    10.
    发明申请

    公开(公告)号:US20220038496A1

    公开(公告)日:2022-02-03

    申请号:US17505301

    申请日:2021-10-19

    申请人: Malwarebytes Inc.

    IPC分类号: H04L29/06

    摘要: A pop-up blocker application detects and remediates malicious pop-up loops. The pop-up blocker application intercepts a call from a web page for initiating a pop-up browser window in a web browser. The pop-up blocker application updates a count of pop-up initiating calls associated with the web page occurring within a pre-defined time window. The updated count is compared to a threshold to determine whether the count meets a threshold indicative of a malicious pop-up loop. Responsive to the count meeting the threshold, the pop-up blocker applications takes a remedial action, such as navigating away from the web page.