Affiliation:
1. College of Cryptographic Engineering, Information Engineering University, Zhengzhou 450001, China
Abstract
The new DLL injection method and its variants can prevent the injected process from calling the common system API to load the injected DLL module so that the malicious module is invisible to the LDR linked list of the process. Traditional injection detection methods have low accuracy in forensic detection of new injection attacks. To solve this problem, this paper proposes a code injection covert memory page detection and forensic detection forensic algorithm based on a memory structure reverse analysis named MRCIF. First, the physical memory pages containing DLL features from the memory image are located, and a sub-algorithm is designed for mapping physical memory space and virtual memory space, thus realizing the reverse reconstruction of the physical page subset corresponding to the DLL code module. Then, in the virtual memory space, the LDR linked list structure of the process is reversely reconstructed, and a reverse reconstruction algorithm of the DLL virtual page subset is developed to reconstruct its virtual space. Finally, a DLL injection covert page detection sub-algorithm is designed based on the physical memory page subset and virtual space page subset. The experimental results indicate that MRCIF achieves an accuracy of 88.89%, which is much higher than that of the traditional DLL module injection detection method, and only MRCIF can accurately detect the Virtual Address Descriptor (VAD) remapping attack.
Funder
National Natural Science Foundation of China
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference20 articles.
1. Fewer, S. (2021, November 15). Reflective Dll Injection. Available online: https://dl.packetstormsecurity.net/papers/general/HS-P005_ReflectiveDllInjection.pdf.
2. Blaam, M. (2021, November 23). Process Hollowing. Available online: https://github.com/m0n0ph1/Process-Hollowing.
3. Hiding Process Memory Via Anti-Forensic Techniques;Palutke;Forensic Sci. Int. Digit. Investig.,2020
4. A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware;Galloro;Comput. Secur.,2021
5. Srivastava, A., and Jones, J.H. (2017, January 13–14). Detecting code injection by cross-validating stack and VAD information in windows physical memory. Proceedings of the 2017 IEEE Conference on Open Systems (ICOS), Miri, Malaysia.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献