Movatterモバイル変換


[0]ホーム

URL:


US20220201016A1 - Detecting malicious threats via autostart execution point analysis - Google Patents

Detecting malicious threats via autostart execution point analysis
Download PDF

Info

Publication number
US20220201016A1
US20220201016A1US17/654,652US202217654652AUS2022201016A1US 20220201016 A1US20220201016 A1US 20220201016A1US 202217654652 AUS202217654652 AUS 202217654652AUS 2022201016 A1US2022201016 A1US 2022201016A1
Authority
US
United States
Prior art keywords
command
suspicious
startup
tag
malware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/654,652
Inventor
Matthew E. Kelly
Jeffrey Dye
Dan E. Summers
David Arnett
Michael E.H. Dunten
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of America CorpfiledCriticalBank of America Corp
Priority to US17/654,652priorityCriticalpatent/US20220201016A1/en
Assigned to BANK OF AMERICA CORPORATIONreassignmentBANK OF AMERICA CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ARNETT, DAVID, DUNTEN, MICHAEL E. H., KELLY, MATTHEW E., SUMMERS, DAN E., DYE, JEFFREY
Publication of US20220201016A1publicationCriticalpatent/US20220201016A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The system collects startup commands associated with network-attached computing devices. A startup command is automatically executed by a device on which the startup command is stored upon startup of the device and is associated with a device identifier for the device. For each startup command, a corresponding command tag is determined for the startup command. Using the device identifier associated with each startup command and the command tag determined for each startup command, a proportion of the plurality of devices is determined that are associated with each command tag. Based on the determined proportion of the plurality of devices that are associated with each command tag, a suspicious command tag is determined. A report is stored that includes the suspicious command tag, suspicious startup command(s) associated with the suspicious command tag, and the device identifier associated with each suspicious startup command.

Description

Claims (20)

1. A system for detecting suspicious startup commands associated with a plurality of network-attached computing devices, the system comprising:
a collection server configured to:
collect startup commands associated with the plurality of network-attached computing devices, wherein each startup command is a command that is automatically executed by a device on which the startup command is stored upon startup of the device, and wherein each startup command is associated with a device identifier for the device on which the command is stored; and
a threat detection device configured to:
receive the collected startup commands from the collection server;
determine, for each startup command, a corresponding command tag for the startup command;
determine, using the device identifier associated with each startup command and the command tag determined for each startup command, a proportion of the plurality of devices that are associated with each command tag;
determine, based on the determined proportion of the plurality of devices that are associated with each command tag, a suspicious command tag, wherein the suspicious command tag is associated with less than a threshold proportion of the plurality of devices; and
store a report comprising the suspicious command tag, one or more suspicious startup commands associated with the suspicious command tag, and the device identifier associated with each suspicious startup command.
8. A method for detecting suspicious startup commands associated with a plurality of network-attached computing devices, the method comprising:
collecting startup commands associated with the plurality of network-attached computing devices, wherein each startup command is a command that is automatically executed by a device on which the startup command is stored upon startup of the device, and wherein each startup command is associated with a device identifier for the device on which the command is stored;
determining, for each startup command, a corresponding command tag for the startup command;
determining, using the device identifier associated with each startup command and the command tag determined for each startup command, a proportion of the plurality of devices that are associated with each command tag;
determining, based on the determined proportion of the plurality of devices that are associated with each command tag, a suspicious command tag, wherein the suspicious command tag is associated with less than a threshold proportion of the plurality of devices; and
storing a report comprising the suspicious command tag, one or more suspicious startup commands associated with the suspicious command tag, and the device identifier associated with each suspicious startup command.
15. A system for detecting suspicious startup commands associated with a plurality of network-attached computing devices, the system comprising:
a memory;
a network interface; and
a hardware processor communicatively coupled to the memory, the hardware processor configured to:
collect startup commands associated with the plurality of network-attached computing devices, wherein each startup command is a command that is automatically executed by a device on which the startup command is stored upon startup of the device, and wherein each startup command is associated with a device identifier for the device on which the command is stored;
determine, for each startup command, a corresponding command tag for the startup command;
determine, using the device identifier associated with each startup command and the command tag determined for each startup command, a proportion of the plurality of devices that are associated with each command tag;
determine, based on the determined proportion of the plurality of devices that are associated with each command tag, a suspicious command tag, wherein the suspicious command tag is associated with less than a threshold proportion of the plurality of devices; and
store a report comprising the suspicious command tag, one or more suspicious startup commands associated with the suspicious command tag, and the device identifier associated with each suspicious startup command.
US17/654,6522019-06-282022-03-14Detecting malicious threats via autostart execution point analysisPendingUS20220201016A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/654,652US20220201016A1 (en)2019-06-282022-03-14Detecting malicious threats via autostart execution point analysis

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US16/456,637US11316873B2 (en)2019-06-282019-06-28Detecting malicious threats via autostart execution point analysis
US17/654,652US20220201016A1 (en)2019-06-282022-03-14Detecting malicious threats via autostart execution point analysis

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/456,637ContinuationUS11316873B2 (en)2019-06-282019-06-28Detecting malicious threats via autostart execution point analysis

Publications (1)

Publication NumberPublication Date
US20220201016A1true US20220201016A1 (en)2022-06-23

Family

ID=74044120

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US16/456,637Active2040-12-30US11316873B2 (en)2019-06-282019-06-28Detecting malicious threats via autostart execution point analysis
US17/654,652PendingUS20220201016A1 (en)2019-06-282022-03-14Detecting malicious threats via autostart execution point analysis

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US16/456,637Active2040-12-30US11316873B2 (en)2019-06-282019-06-28Detecting malicious threats via autostart execution point analysis

Country Status (1)

CountryLink
US (2)US11316873B2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11316873B2 (en)*2019-06-282022-04-26Bank Of America CorporationDetecting malicious threats via autostart execution point analysis
EP4049156A4 (en)*2019-10-252023-07-19Hewlett-Packard Development Company, L.P. IDENTIFICATION OF MALWARE
US11483351B2 (en)2020-08-262022-10-25Cisco Technology, Inc.Securing network resources from known threats

Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060031673A1 (en)*2004-07-232006-02-09Microsoft CorporationMethod and system for detecting infection of an operating system
US20070289019A1 (en)*2006-04-212007-12-13David LowreyMethodology, system and computer readable medium for detecting and managing malware threats
US20090235089A1 (en)*2008-03-122009-09-17Mathieu CietComputer object code obfuscation using boot installation
US20120167218A1 (en)*2010-12-232012-06-28Rajesh PoornachandranSignature-independent, system behavior-based malware detection
US20130117006A1 (en)*2011-11-072013-05-09Microsoft CorporationSimulated boot process to detect introduction of unauthorized information
CA2854183A1 (en)*2011-11-032013-05-10Cyphort, Inc.Systems and methods for virtualized malware detection
US20130239214A1 (en)*2012-03-062013-09-12Trusteer Ltd.Method for detecting and removing malware
US9251343B1 (en)*2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US9330260B1 (en)*2013-07-252016-05-03Symantec CorporationDetecting auto-start malware by checking its aggressive load point behaviors
US20170235957A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US20190007436A1 (en)*2017-07-032019-01-03Juniper Networks, Inc.Malware identification via secondary file analysis
US20190012465A1 (en)*2017-07-052019-01-10Electronics And Telecommunications Research InstituteApparatus and method for collecting audit trail in virtual machine boot process
US20200394305A1 (en)*2019-06-112020-12-17Sophos LimitedEarly boot driver for start-up detection of malicious code
US11316873B2 (en)*2019-06-282022-04-26Bank Of America CorporationDetecting malicious threats via autostart execution point analysis
US11328056B2 (en)*2018-08-222022-05-10CyCarrier Technology Co., Ltd.Suspicious event analysis device and related computer program product for generating suspicious event sequence diagram
US11763004B1 (en)*2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US1000937A (en)1910-12-021911-08-15William L PeelerFountain-brush.
US6321338B1 (en)1998-11-092001-11-20Sri InternationalNetwork surveillance
US7007302B1 (en)2001-08-312006-02-28Mcafee, Inc.Efficient management and blocking of malicious code and hacking attempts in a network environment
US7340774B2 (en)2001-10-152008-03-04Mcafee, Inc.Malware scanning as a low priority task
US7376970B2 (en)2004-02-202008-05-20Microsoft CorporationSystem and method for proactive computer virus protection
US8898788B1 (en)2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US20050268112A1 (en)2004-05-282005-12-01Microsoft CorporationManaging spyware and unwanted software through auto-start extensibility points
US7874001B2 (en)2005-07-152011-01-18Microsoft CorporationDetecting user-mode rootkits
WO2007011816A2 (en)2005-07-152007-01-25Atka Software, LlcAn improved means for protecting computers from malicious software
US7730040B2 (en)2005-07-272010-06-01Microsoft CorporationFeedback-driven malware detector
US8468604B2 (en)2005-08-162013-06-18Emc CorporationMethod and system for detecting malware
US7647636B2 (en)2005-08-242010-01-12Microsoft CorporationGeneric RootKit detector
US8266692B2 (en)2006-07-052012-09-11Bby Solutions, Inc.Malware automated removal system and method
US7971258B1 (en)2007-09-282011-06-28Trend Micro IncorporatedMethods and arrangement for efficiently detecting and removing malware
US7559086B2 (en)2007-10-022009-07-07Kaspersky Lab, ZaoSystem and method for detecting multi-component malware
US8291493B2 (en)2007-11-272012-10-16Mcafee, Inc.Windows registry modification verification
US10262136B1 (en)2008-08-042019-04-16Zscaler, Inc.Cloud-based malware detection
US8413253B2 (en)*2009-12-302013-04-02Intel CorporationProtecting persistent secondary platform storage against attack from malicious or unauthorized programs
US8468602B2 (en)2010-03-082013-06-18Raytheon CompanySystem and method for host-level malware detection
US8707427B2 (en)2010-04-062014-04-22Triumfant, Inc.Automated malware detection and remediation
KR101122650B1 (en)2010-04-282012-03-09한국전자통신연구원Apparatus, system and method for detecting malicious code injected with fraud into normal process
RU2454714C1 (en)2010-12-302012-06-27Закрытое акционерное общество "Лаборатория Касперского"System and method of increasing efficiency of detecting unknown harmful objects
US8997233B2 (en)2011-04-132015-03-31Microsoft Technology Licensing, LlcDetecting script-based malware using emulation and heuristics
US8955132B2 (en)2011-04-142015-02-10F-Secure CorporationEmulation for malware detection
RU2472215C1 (en)2011-12-282013-01-10Закрытое акционерное общество "Лаборатория Касперского"Method of detecting unknown programs by load process emulation
US9292688B2 (en)2012-09-262016-03-22Northrop Grumman Systems CorporationSystem and method for automated machine-learning, zero-day malware detection
US9613210B1 (en)2013-07-302017-04-04Palo Alto Networks, Inc.Evaluating malware in a virtual machine using dynamic patching
US9213831B2 (en)2013-10-032015-12-15Qualcomm IncorporatedMalware detection and prevention by monitoring and modifying a hardware pipeline
US9178900B1 (en)2013-11-202015-11-03Trend Micro Inc.Detection of advanced persistent threat having evasion technology
US9769198B1 (en)2014-03-312017-09-19Juniper Networks, Inc.Malware detection using internal and/or external malware detection operations
US10122753B2 (en)2014-04-282018-11-06Sophos LimitedUsing reputation to avoid false malware detections
US9392015B2 (en)2014-04-282016-07-12Sophos LimitedAdvanced persistent threat detection
US10652263B2 (en)2014-07-212020-05-12David Paul HeiligIdentifying malware-infected network devices through traffic monitoring
US10198579B2 (en)2014-08-222019-02-05Mcafee, LlcSystem and method to detect domain generation algorithm malware and systems infected by such malware
US9690933B1 (en)2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US9690938B1 (en)2015-08-052017-06-27Invincea, Inc.Methods and apparatus for machine learning based malware detection
US9928366B2 (en)2016-04-152018-03-27Sophos LimitedEndpoint malware detection using an event graph
WO2017223294A1 (en)2016-06-222017-12-28Invincea, Inc.Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
US10216933B1 (en)2016-09-162019-02-26Symantec CorporationSystems and methods for determining whether malicious files are targeted
US10798112B2 (en)2017-03-302020-10-06Fireeye, Inc.Attribute-controlled malware detection
US10616267B2 (en)2017-07-132020-04-07Cisco Technology, Inc.Using repetitive behavioral patterns to detect malware
US10581888B1 (en)*2017-07-312020-03-03EMC IP Holding Company LLCClassifying software scripts utilizing deep learning networks
US11113027B2 (en)*2017-12-282021-09-07Sharp Kabushiki KaishaApparatus, system, and method that support operation to switch to input terminal to be activated among input terminals included in display apparatus
US11126721B2 (en)2018-06-282021-09-21Intel CorporationMethods, systems and apparatus to detect polymorphic malware

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060031673A1 (en)*2004-07-232006-02-09Microsoft CorporationMethod and system for detecting infection of an operating system
US20070289019A1 (en)*2006-04-212007-12-13David LowreyMethodology, system and computer readable medium for detecting and managing malware threats
US20090235089A1 (en)*2008-03-122009-09-17Mathieu CietComputer object code obfuscation using boot installation
US20120167218A1 (en)*2010-12-232012-06-28Rajesh PoornachandranSignature-independent, system behavior-based malware detection
CA2854183A1 (en)*2011-11-032013-05-10Cyphort, Inc.Systems and methods for virtualized malware detection
US20130117006A1 (en)*2011-11-072013-05-09Microsoft CorporationSimulated boot process to detect introduction of unauthorized information
US20130239214A1 (en)*2012-03-062013-09-12Trusteer Ltd.Method for detecting and removing malware
US9251343B1 (en)*2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
US9330260B1 (en)*2013-07-252016-05-03Symantec CorporationDetecting auto-start malware by checking its aggressive load point behaviors
US20170235957A1 (en)*2016-02-162017-08-17Atmel CorporationControlled secure code authentication
US20190007436A1 (en)*2017-07-032019-01-03Juniper Networks, Inc.Malware identification via secondary file analysis
US20190012465A1 (en)*2017-07-052019-01-10Electronics And Telecommunications Research InstituteApparatus and method for collecting audit trail in virtual machine boot process
US11328056B2 (en)*2018-08-222022-05-10CyCarrier Technology Co., Ltd.Suspicious event analysis device and related computer program product for generating suspicious event sequence diagram
US11763004B1 (en)*2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection
US20200394305A1 (en)*2019-06-112020-12-17Sophos LimitedEarly boot driver for start-up detection of malicious code
US11316873B2 (en)*2019-06-282022-04-26Bank Of America CorporationDetecting malicious threats via autostart execution point analysis

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Johnson, A. et. al, Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management, LISA 2004, November 14 - 19, 2004" (Year: 2004)*
"Tabish, S. et. al, Malware Detection Using Statistical Analysis of Byte-Level File Content, NexGIN RC 2009, June 28, 2009" (Year: 2009)*
Tu, T. D., Guang, C., Xiaojun, G., Wubin, P. "Webshell detection techniques in web applications". 11 - 13 July 2014. IEEE. Fifth International Conference on Computing, Communications, and Networking Technologies (ICCCNT). 2014. (Year: 2014)*

Also Published As

Publication numberPublication date
US20200412745A1 (en)2020-12-31
US11316873B2 (en)2022-04-26

Similar Documents

PublicationPublication DateTitle
US12166786B1 (en)Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US20220201016A1 (en)Detecting malicious threats via autostart execution point analysis
US10601848B1 (en)Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
Almousa et al.Api-based ransomware detection using machine learning-based threat detection models
US9892261B2 (en)Computer imposed countermeasures driven by malware lineage
US10216934B2 (en)Inferential exploit attempt detection
US12282554B2 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20170083703A1 (en)Leveraging behavior-based rules for malware family classification
US20230252136A1 (en)Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
US11770388B1 (en)Network infrastructure detection
WO2015081791A1 (en)Method and apparatus for scanning and removing kernel-level malware
US20200019704A1 (en)Systems and Methods for Detecting Obfuscated Malware in Obfuscated Just-In-Time (JIT) Compiled Code
US20230254340A1 (en)Apparatus for processing cyber threat information, method for processing cyber threat information, and medium for storing a program processing cyber threat information
CN107566401B (en) Protection method and device for virtualized environment
US20230252144A1 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20240054215A1 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US12430437B2 (en)Specific file detection baked into machine learning pipelines
US20240054210A1 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
CN118101291A (en) Network service security protection method and system based on big data mining
US10601867B2 (en)Attack content analysis program, attack content analysis method, and attack content analysis apparatus
CN113569240B (en)Method, device and equipment for detecting malicious software
CN115695031A (en)Host computer sink-loss detection method, device and equipment
US20230306113A1 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US20230048076A1 (en)Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program
US11763004B1 (en)System and method for bootkit detection

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KELLY, MATTHEW E.;DYE, JEFFREY;SUMMERS, DAN E.;AND OTHERS;SIGNING DATES FROM 20140709 TO 20190625;REEL/FRAME:059255/0848

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp