Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How Stealthy Malware Avoids Detection in Corporate Networks

    By
    Chris Preimesberger
    -
    October 27, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How Stealthy Malware Avoids Detection in Corporate Networks

      1 - How Stealthy Malware Avoids Detection in Corporate Networks

      Despite best efforts, enterprises remain a prime target for hackers, thanks to these techniques hackers are using to hide malware.

      2Windows Registry

      2 - Windows Registry

      The Windows Registry is large and complex, leaving several places where malware can insert itself to remain undetected. A good example of this behavior is Poweliks. Poweliks sets a null entry utilizing the built-in Windows APIs, ZwSetValueKey, which allows it to create a registry key with an encoded data blob. This is one of the many ways malware can utilize the Windows Registry to hide out, autostart and maintain persistence on many systems.

      3Process Injection

      3 - Process Injection

      Process injection is exactly what it sounds like; it injects bits of code into a running process. Malware leverages process injection techniques to hide code execution and avoid detection by utilizing known “good” processes such as svchost.exe or explorer.exe. To inject malware into known good processes, malware writers use built-in Windows APIs—for example, setting debug. When a process sets debug, it gains access to many of the debug API calls, such as attaching to other processes and instructing that process to allocate additional memory. After the process allocates more memory, the malicious process can inject whatever code it wishes into that process.

      4A Real-Life Example of Process Injection

      4 - A Real-Life Example of Process Injection

      A great example of malware that uses process injection is Poison Ivy. Poison Ivy inflicts damage by sharding, which is a type of database portioning. Imagine that instead of having one giant memory block, it has a number of tiny memory blocks split among various processes, which makes analyzing Poison Ivy more of a pain and reverse-engineering it more difficult and a much longer process.

      5Process Hollowing

      5 - Process Hollowing

      Another technique related to process injection is called process hollowing. Hollowing is when a known, good process is started in a suspended state. When the code is loaded and preparing to execute, the good code is scooped out (think of an ice cream scoop) so there is space for the bad guys to input code of their choice and change headers on the top and bottom. This makes it appear as though the code is good and then the process is restarted. To the untrained eye, this appears to be a normal system process started by Windows. It is, therefore, more difficult for reverse-engineers and memory forensics people to analyze. Dridex is a good example of a malware family that often uses process hollowing.

      6Process List Unlinking

      6 - Process List Unlinking

      Process list unlinking is another key concept. A process is anything that is running on your computer, whether it be in user space or kernel space. Process list unlinking involves manipulating the “process list,” which is a doubly linked list that contains all “active” processes. It’s important because unlinking will result in the process being hidden from all “active” tools. This can be done using ZwSystemDebugControl() or by mapping DevicePhysicalMemory.

      7How to Remove Process From a List

      7 - How to Remove Process From a List

      A Flink to the process before it and then Blink to the one in front of it effectively removes the process from the list. More advanced malware will take this a step further, and after they remove that process from the list, they will write over that bit of memory, so that even with memory forensics investigators won’t be able to locate that process. There are tools security researchers use to find hidden malicious code, such as PsAc4veProcessHead traversal; Pool tag scanning for processes; and Pool tag scanning for threads?PspCidTable

      8DLL List Unlinking

      8 - DLL List Unlinking

      Malware can also hide by manipulating the DLL list. Just like the process list, a DLL list has a double-linked list that points to the DLL in front and behind, and again, just like the process lists, are APIs that can be called to rewrite entries in the DLL list, remove that DLL entry and wipe out that bit of memory to help hide the malware from memory forensics or from backup tools. This is used a lot in rootkit activity.

      9Kernel Module List Unlinking

      9 - Kernel Module List Unlinking

      Kernel modules are the next level down. A kernel module includes any of the modules that are loaded into the kernel. Like the DLL and process list, the kernel modules have their own list that can be queried with APIs and return every kernel module that is loaded. There are also debug APIs that can remove one kernel module from the list and zero it out. This is especially important because at the kernel level, when something is zeroed out, it makes it a lot harder to find—this access is like ring-zero access—definitely associated with rootkit activity. Generally, a piece of malware will execute in user space and then try a kernel-level exploit to get kernel administrative access and then drop the main rootkit, which would then zero itself out inside the kernel module list process list. At this point, the malware is very well-hidden and it will be very difficult to find.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×