FIELD: information security.
SUBSTANCE: apparatus comprises an emulation tool intended for emulating execution of the instructions of a file on the virtual processor of the emulator; suspending the emulation of execution of the instructions on an API function call; confirming the presence of the API function in the set of updated modules; emulating the execution of said API function following the instructions according to the implementation from the corresponding updated module if the API function is found; transferring control to the execution tool if the API function is not found in the set of updated modules; continuing the emulation of execution of the instructions of the file from the instruction on the return address of the API function using the result of execution of the API function; a set of updated modules stored in the memory consisting of at least one updated module, wherein each updated module from said set comprises an implementation of at least one API function; an execution tool intended for forming the result of execution of said API function according to the implementation of the API function stored in the execution tool or created by the execution tool and further transferring the result of execution of the API function to the emulation tool.
EFFECT: increase in the accuracy of emulation of the instructions of a file, increase in the level of detection of malicious code, reduction in the time of response to new threats.
20 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
METHOD OF EMULATING SYSTEM FUNCTION CALLS FOR EVADING EMULATION COUNTERMEASURES | 2012 |
|
RU2514141C1 |
METHOD FOR ENHANCEMENT OF OPERATIONAL EFFICIENCY OF HARDWARE ACCELERATION OF APPLICATION EMULATION | 2012 |
|
RU2514142C1 |
SYSTEM AND METHOD OF STORAGE OF EMULATOR STATE AND ITS FURTHER RECOVERY | 2013 |
|
RU2553056C2 |
SYSTEM AND METHOD FOR AUTOMATIC PROCESSING OF SOFTWARE SYSTEM ERRORS | 2012 |
|
RU2521265C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
METHOD FOR FILE EXECUTION EMULATION | 2017 |
|
RU2659734C1 |
SYSTEM AND METHOD OF GENERATING LOG WHEN EXECUTING FILE WITH VULNERABILITIES IN VIRTUAL MACHINE | 2018 |
|
RU2724790C1 |
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION | 2011 |
|
RU2472215C1 |
METHOD FOR EMULATING THE EXECUTION OF FILES COMPRISING INSTRUCTIONS, DIFFERENT FROM MACHINE INSTRUCTIONS | 2017 |
|
RU2659742C1 |
Authors
Dates
2021-10-15—Published
2020-06-19—Filed