NoVirusThanks OSArmor

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
293
@Andy Ful

Feel free to send me the bypasses via PM, thank you :)

@Xtwillight

Great! Emsisoft, Bitdefender and F-Secure have fixed the FP.

I already contacted GData and Cyren.

@Evjl's Rain

OSArmor already guards java.exe and javaw.exe, but we can add the option to "Block any process executed from java.exe and javaw.exe" (unchecked by default).

About teamviewer processes, yes we can add them too.

@Aktiffiso

OSArmor should work fine with other security software.

If you need a free lifetime license for ERPv3 just PM me, I'll send it via PM ;)

//Everyone

Here are two more videos that demonstrate OSArmor in action:

Block MS Word (DOC) Exploit Payload with OSArmor

* In the above case the DOC exploit payload executed (and blocked) is svchost.exe

Block MS Excel Exploit Payload with OSArmor
 

Evjl's Rain

Level 47
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Apr 18, 2016
3,684
I have this report. It blocked the official Teamviewer package to run. TV created temp files. Besides unchecking the rule, is there any to run way it? :(
EDIT: teamviewer portable works => I will switch to TV portable permanently
Code:
Date/Time: 12/18/2017 3:55:15 PM
Process: [7948]C:\Users\evjlsrain\AppData\Local\Temp\TeamViewer\TeamViewer_.exe
Parent: [624]D:\TeamViewer_Setup.exe
Rule: BlockSuspiciousProcesses
Rule Name: Block execution of suspicious processes
Command Line: "C:\Users\EVJLSR~1\AppData\Local\Temp\TeamViewer\TeamViewer_.exe"
Signer: TeamViewer GmbH
Parent Signer: TeamViewer GmbH
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,510
This program can be used together with Hard_Configurator.
Yes. They overlap in many things, but also have some unique features.
As for OSArmor it needs whitelisting some processes:
  • C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8388616 WinX:0 WinY:0 IEFrame:0000000000000000
  • "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11711.1001.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca
and probably some others ran by rundll32.exe or svchost.exe
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,510
I thought that exiting OSArmor would stop the protection. But it is not true for some actions. Here is the log entry, when I tried opening for the edition in notepad, the PowerShell script in Total Commander:
Date/Time: 18.12.2017 23:14:13
Process: [5868]C:\Windows\notepad.exe
Parent: [6240]C:\Program Files\totalcmd\TOTALCMD64.EXE
Rule: BlockDownloadOfURLsCmdline
Rule Name: Block download of remote URLs via command-lineCommand Line: C:\Windows\notepad.exe C:\Users\Admin\Downloads\temp\RunRemote_System.Net.WebClient_Shell.Application.ps1
Signer: Parent Signer: Ghisler Software GmbH
.
Also, the vbs script is blocked (harmless trojan downloader, that downloads and runs sumo_lite.exe):
Date/Time: 18.12.2017 23:33:10
Process: [9288]C:\Users\Admin\Downloads\sumo_lite.exe
Parent: [5556]C:\Windows\System32\wscript.exe
Rule: BlockProcessesFromWscript
Rule Name: Block any process executed from wscript.exe
Command Line: "C:\Users\Admin\Downloads\sumo_lite.exe"
Signer: KC SoftwaresParent Signer:
.
It seems that some features are still active.
 
Last edited:

bribon77

Level 35
Verified
Top Poster
Well-known
Jul 6, 2017
2,392
Yes. They overlap in many things, but also have some unique features.
As for OSArmor it needs whitelisting some processes:
  • C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8388616 WinX:0 WinY:0 IEFrame:0000000000000000
  • "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11711.1001.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca
and probably some others ran by rundll32.exe or svchost.exe
That is question.. Can there be conflicts or not?
I'm interested because I'm using, Hard_Configurator
 
Last edited:

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
293
I've released a new version v1.1:
Prevent Malware and Ransomware with OSArmor | NoVirusThanks

This is the changelog:

[18-Dec-2017] v1.1.0.0

+ Block any process executed from java.exe and javaw.exe (unchecked by default)
+ Block any process executed from mmc.exe (unchecked by default)
+ Block any process executed from wmiprvse.exe (unchecked by default)
+ Block any process executed from mstsc.exe (Remote Desktop) (unchecked by default)
+ Block unknown processes executed from TeamViewer (unchecked by default)
+ Block execution of any process related to TeamViewer (unchecked by default)
+ Block execution of .wsf scripts
+ Improved detection of suspicious processes
+ Improved detection of suspicious svchost.exe behaviors
+ Fixed hiding of the GUI window on PC reboot
+ Fixed some false positives

To update just uninstall the old version and install the new one.

No reboot needed.

@Andy Ful

Thanks for posting the content of the log file, it helps me understand why it was blocked.

I'll fix that FPs in the next build. If you find new ones just post them here.

If you close the OSArmor UI the protection is still active via the service, soon we'll add the option to disable the protection.

Actually the only way to avoid a FP is to disable the rule that caused it, via the Configurator.

@Evjl's Rain

The FP with TeamViewer should be fixed now.

Try to see if these two options work as you expected:

+ Block unknown processes executed from TeamViewer (unchecked by default)
+ Block execution of any process related to TeamViewer (unchecked by default) -> Some malware uses TeamViewer hence why I added it

@Glashouse

We'll add an option to exclude some events.

@Aktiffiso

You can help testing OSArmor by installing it and using normally your PC.
Would be very useful for me to know if it blocks some legit processes (false positives), so I can fix them.
Please post the content of the event that is blocked (taken from the log file).
 
P

plat1098

@NoVirusThanks: please consider to whitelist Stardock/ObjectDock. The message from OSA appears at startup and no obvious issues with the dock afterward. Thank you. :)

objectdockosa.PNG

rundll32 osa.png
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Should i have to desactivate secure boot from bios before install it?
If you are on windows 10, latest version, you need to turn off secure boot, unless your win10 is an old version, or is an upgrade from an earlier version of windows, in which case you don't need to. The way to know for sure is to try installing OSA, and see if you get a warning from windows, about unsigned drivers. If you get the warning, cancel the installation, disable secure boot, and then install.
 

Deletedmessiah

Level 25
Verified
Top Poster
Content Creator
Well-known
Jan 16, 2017
1,469
If you are on windows 10, latest version, you need to turn off secure boot, unless your win10 is an old version, or is an upgrade from an earlier version of windows, in which case you don't need to. The way to know for sure is to try installing OSA, and see if you get a warning from windows, about unsigned drivers. If you get the warning, cancel the installation, disable secure boot, and then install.
There's no secure boot on Windows 8.1 right?
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
There's no secure boot on Windows 8.1 right?
Secure boot is a feature in the firmware/BIOS, that is where you turn it on or off.
Windows 10, in the later versions, has an additional restriction related to secure boot, it will not allow Windows to start if drivers are not co-signed. That is the issue with OSA. As far as I know, Windows 8.1 does not have this restriction.
If you try to install something, and the drivers are problematic, Windows will warn you right away. So it's a no-brainer. If you get the Windows warning, just cancel the installation, until you disable secure boot.
 

Windows_Security

Level 24
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 13, 2016
1,298
Overhead of NVT OSArmor on Intel G3240 Pentium with Samsung 850 SSD is just under half a second on my low spec 3,5 year old Pentium dual core (running at 3.1 Ghz), so on most systems it should be less than 0.2 secs (which is barely noticeable).

C:\Program Files\Google\Chrome\Application\chrome.exe - 5 (first cold start from disk, second to fifth cached from memory)
0.9974
0.5693
0.5170
0.5664
0.5312

C:\Program Files\Google\Chrome\Application\chrome.exe - 5 executions with NVT OSArmor (cached delay indicates CPU overhead)
1.0564
1.1627
1.0454
0.9800
0.8386
 
Last edited:

harlan4096

Super Moderator
Verified
Staff Member
Malware Hunter
Well-known
Apr 28, 2015
8,910
@NoVirusThanks:
NVTOSA 1.1 (Default Settings): blocking Clover (Chrome tabbed style file browser):
Date/Time: 19/12/2017 8:17:03
Process: [2032]D:\Program Files (x86)\Clover\Clover.exe
Parent: [6100]C:\Windows\explorer.exe
Rule: BlockSuspiciousProcesses
Rule Name: Block execution of suspicious processes
Command Line: "D:\Program Files (x86)\Clover\clover.exe"
Signer: Shanghai Oriental Webcasting Co. Ltd.
Parent Signer: Microsoft Windows
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top