AppGuard Defeats Weaponized Document

Status
Not open for further replies.

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Awesome share hj*** I mean Jeff :rolleyes:
Seriously though, thanks to you I am starting to take AppGuard seriously.
VS and AppGuard are looking like they may overlap some, but for me running
a Sigless Windows build, this may be worth looking at combining the powers of
the two. I think it would make for a dynamic duo :)
Thanks Jeff
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Awesome share hj*** I mean Jeff :rolleyes:
Seriously though, thanks to you I am starting to take AppGuard seriously.
VS and AppGuard are looking like they may overlap some, but for me running
a Sigless Windows build, this may be worth looking at combining the powers of
the two. I think it would make for a dynamic duo :)
Thanks Jeff
go for it!
 

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
Last edited:
D

Deleted member 2913

Thread author
By the way, in the video, VT example for zeroday detection of 3rd party AV is ok to know the detection by multiple AVs BUT doesn't shows 3rd party AVs real/true/full protection mechanism result.
 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
It would be interesting to prove that this file actually is 0day.
VirusTotal is not the best source to evaluate this thing, but it would have been necessary to analyse the sample, or at least have the Malwr or Hybrid A. report to get the best directions.
 

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
Since AppGuard does not rely on signature detection or behavior blocker, I think that regardless of whether a file is zero-day malware or not, what the video still shows is how AppGuard prevents the infection from happening.
 

tim one

Level 21
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
Since AppGuard does not rely on signature detection or behavior blocker, I think that regardless of whether a file is zero-day malware or not, what the video still shows is how AppGuard prevents the infection from happening.
This video surprises me because it shows the sample has been locked by the policy restrictions of AppGuard, but not because it really is 0day for what I can ascertain and the video wants to demonstrate
 

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
This video surprises me because it shows the sample has been locked by the policy restrictions of AppGuard, but not because it really is 0day for what I can ascertain and the video wants to demonstrate
That's because Office files are automatically guarded (default). And so, when the files were launched, AppGuard blocked other operations that were unnecessary for these documents to do. :)
 

Dirk41

Level 17
Verified
Top Poster
Mar 17, 2016
797
Not contesting AppGuard reliability but just to clarify , from VT:

BAD IDEA: VirusTotal for antivirus/URL scanner testing
At VirusTotal we are tired of repeating that the service was not designed as a tool to perform antivirus comparative analyses, but as a tool that checks suspicious samples with several antivirus solutions and helps antivirus labs by forwarding them the malware they fail to detect. Those who use VirusTotal to perform antivirus comparative analyses should know that they are making many implicit errors in their methodology, the most obvious being:

  • VirusTotal's antivirus engines are commandline versions, so depending on the product, they will not behave exactly the same as the desktop versions: for instance, desktop solutions may use techniques based on behavioural analysis and count with personal firewalls that may decrease entry points and mitigate propagation, etc.
  • In VirusTotal desktop-oriented solutions coexist with perimeter-oriented solutions; heuristics in this latter group may be more aggressive and paranoid, since the impact of false positives is less visible in the perimeter. It is simply not fair to compare both groups.
  • Some of the solutions included in VirusTotal are parametrized (in coherence with the developer company's desire) with a different heuristic/agressiveness level than the official end-user default configuration.
These are just three examples illustrating why using VirusTotal for antivirus testing is a bad idea.
 

mlnevese

Level 28
Verified
Top Poster
Well-known
May 3, 2015
1,742
By the way, in the video, VT example for zeroday detection of 3rd party AV is ok to know the detection by multiple AVs BUT doesn't shows 3rd party AVs real/true/full protection mechanism result.

That's quite true... Many times I downloaded samples from this forum, before the changes in policy, and Virus Total would say that Kaspersky didn't detect the sample while on my computer it was detecting either by signature, cloud, heuristics or behavior... I assume it's the same for all security products in VT.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top