FIELD: physics.
SUBSTANCE: invention relates to a method of generating a log when executing a file with vulnerabilities. Method comprises steps of: detecting, by an interception means during execution of a process stream created when opening said file, an event, at occurrence of which triggers a flip-flop describing conditions associated with an event associated with an attempt to exploit a malicious application of said file; method includes analysing, by an interception means, a stack of a process created when opening said file, detecting a sequence of calls of functions preceding an event on which a trigger has triggered; method includes analysing, by an intercepting means, a detected sequence of function calls for performing associated triggering conditions; in case of accompanying triggering conditions related to attempt to exploit said file vulnerability by malware, data on detected sequence of function calls are stored in log for subsequent analysis by means of analysis in order to detect availability of malicious application in virtual machine.
EFFECT: technical result is higher accuracy of detecting presence in a virtual machine of a malicious application exploiting a security file vulnerability.
14 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF FILE ANALYSIS FOR MALICIOUSNESS IN VIRTUAL MACHINE | 2017 |
|
RU2665911C2 |
SYSTEM AND METHOD FOR LOG FORMING IN VIRTUAL MACHINE FOR ANTI-VIRUS FILE CHECKING | 2017 |
|
RU2649794C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
METHOD OF DETECTING MALICIOUS FILES THAT COUNTERACT ANALYSIS IN ISOLATED ENVIRONMENT | 2018 |
|
RU2708355C1 |
SYSTEM AND METHOD FOR PERFORMING ANTI-VIRUS SCAN OF FILE ON VIRTUAL MACHINE | 2016 |
|
RU2628921C1 |
METHOD FOR EXCLUDING PROCESSES OF ANTIVIRUS SCANNING ON THE BASIS OF DATA ON FILE | 2015 |
|
RU2595510C1 |
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD | 2018 |
|
RU2697954C2 |
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
SYSTEM AND METHOD FOR CATEGORIZATION OF .NET APPLICATIONS | 2018 |
|
RU2756186C2 |
EMULATOR AND METHOD FOR EMULATION | 2020 |
|
RU2757409C1 |
Authors
Dates
2020-06-25—Published
2018-12-28—Filed