-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Request for explaination] why does it look like only the user that install the tool get restricted ? #116
Comments
It look like I was pointing to the right direction. I made the following adjustment in the RaccineLib/Raccine.h to move temp folder to a common one :
and the problem seems to be solved ( for now... ). |
Shouldn't we just put the RaccineSettings.exe RUN key entry into HKLM? |
I see 2 reasons : In conclusion: moving RaccineSettings.exe to HKLM Run key can be a good option to ensure every interactive user will get alert popups and configuration capabilities but we should also be sure that Raccine will work properly even if RaccineSettings had never been launch. Adding the folder existence test/creation directly in the Raccine.exe protect us from users that simply delete the temp folder to bypass the protection as it will be recreated every time if needed (I'm not a professional programmer, if I could find this weakness, more skilled people surely can also). This is only "My" point of view. It could be nice to have someone else's remarks and suggestions.... |
Has anyone seen Ransomware loaders that don't execute in a user context or loaded user profile. If there is Ransomware that doesn't load a user profile, there is more need to handle this problem. |
You may ask, "why not?" That's why I'd like to make this small assessment regarding the necessity of the change. |
An "in between" solution can be to change folder permission to something more restrictive upon creation (need a little more research...). "Has anyone seen Ransomware loaders that don't execute in a user context or loaded user profile." I not really up-to-date about that but i guess a huge amount of those used to ransom companies do. You said Raccine main purpose is Ransomware protection. Weaponized document is one of the possible intrusion medium. Once on a network, it mostly propagate itself using other methods ( i.e. scheduled tasks run as system, remote shell/powershell scripts, ...) . Whatever the solution, the goal should be to ensure that Raccine is always executed properly regardless the account used and if this account has a profile loaded or not. I'm not a security nor active directory expert. I've just been recently asked by our company security team to deploy your solution widely on all our domain controller to avoid an attack as a quick fix solution. Domain controllers are priority targets for hackers that want to ransom an organization and is precisely a case were multiple users can logon on a single server. |
A short question, what kind of file are stored in the temporary folder ? I didn't point the privacy issue because every time I've looked in those directories, they were empty. I dumbly thought they were only use to compile and process rules and that command lines details remains in memory. If you're on a personal device, you're probably the only known user meaning no one else that you can logon then the risk of someone else come retrieve sensitive information is quite low were ever you place files. It starts to be a concern when several users can logon then every possible users should be restricted. Another possible solution could be to simply delete the created file right after they have been used. |
The process command line information of the respective process.
That's why you see that folder as empty. They exist for some milliseconds and then get deleted.
If the entry vector is email / attachments than most likely "no, they're not". So, to get back to the actual problem. You say, that the current I'll add your fix that creates the folder but won't change it to a subfolder of %ProgramData%. |
Sounds good to me. |
Hi,
There is something that look a little weird in the implementation.
When Raccine is call via
image file execution options
, I guess that is it looking for a temporary folder to process yara files. (RaccineUserContext if I'm correct).If this folder doens't exist, it seems that yara file are not processed and the program is run whatever it's safe or not.
The problem is that this folder is created by RaccineSettings.exe which is launched via a registry value placed in HKCU ( the profile of the user who did the installation =>surely an IT admin). Any other user or remote execution that don't load a user profile will fall in the case explainned just above.
Are my guessings correct ? how can we solve that issue ?
Can't we just create the folder in the Raccine.exe itself if it doesn't exist instead of in the RaccineSettings.exe?
thanks for your answer.
The text was updated successfully, but these errors were encountered: