• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (08): 1472-1478.

• 论文 • Previous Articles     Next Articles

A novel method of hiding the injected modules

WU Jian,LIU Xin   

  1. (Key Laboratory of Intelligent Computing and Information Processing,Ministry of Education,
    College of Information Engineering of Xiangtan University,Xiangtan 411105,China)
  • Received:2014-08-11 Revised:2014-12-02 Online:2015-08-25 Published:2015-08-25

Abstract:

In the field of information security,security analysis tools often inject some modules into other process space for monitoring dangerous behaviors, but malwares will scan their own process space and find out the monitor modules to avoid antimonitoring. So security analysis tools should hide the modules that are injected into the target process space. There are many methods for hiding modules, such as disconnecting the LDR_MODULE chain, hooking the function of the enumeration module, erasing the PE header, and so on. But these methods have significant limitations. To make an improvement, we propose a novel method to hide the injected modules. Ordinary module injection is given so they can be neglected by malwares; then the modules are eliminated by themselves, so that malwares cannot detect the presence of the monitoring softwares. Besides, we list out solutions to some typical specific technical problems in practice. Experimental results show that the proposed method has good capability to break through the defense system, it is compatible with various versions of Windows operating systems, and its concealment is better than the traditional methods.

Key words: information security;Rootkit;thread injection;hide module;thread injection with module;thread injection without module