Skip to content

Commit

Permalink
Merge pull request #13 from chkp-ramanl/enhancements
Browse files Browse the repository at this point in the history
Added a new mouse movement check technique and updated the footer.
  • Loading branch information
chkp-alexanderc authored Feb 5, 2024
2 parents 1a5087b + 0444dda commit de787b4
Show file tree
Hide file tree
Showing 5 changed files with 32 additions and 2 deletions.
2 changes: 1 addition & 1 deletion _includes/footer.html
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@

<br>

© 1994-2022 Check Point Software Technologies LTD | All rights reserved | Property of CheckPoint.com
© 1994-2024 Check Point Software Technologies LTD | All rights reserved | Property of CheckPoint.com


</div>
Expand Down
32 changes: 31 additions & 1 deletion _techniques/human-like-behavior.md
Original file line number Diff line number Diff line change
Expand Up @@ -169,10 +169,40 @@ Such a short delay of only 2 seconds implies that the user should be active at t

<hr class="space">

More sophisticated checks rely on detection of not only the mouse movement per se but the pattern of such movement. The following example is taken from the research of <a href="https://outpost24.com/blog/lummac2-anti-sandbox-technique-trigonometry-human-detection/">LummaC2 Stealer</a> conducted by Outpost24.

First, malware captures mouse movements with the delay of 50 msec between them.

<div style="text-align: center; margin: auto">
<img src="{{site.baseurl}}/assets/images/trigonometry_mouse_check_1.webp"><br />
</div>

<hr class="space">

Second, the vectors are drawn out of paired captured positions.

<div style="text-align: center; margin: auto">
<img src="{{site.baseurl}}/assets/images/trigonometry_mouse_check_2.webp"><br />
</div>

<hr class="space">

Next, the angles are calculated between the corresponding vectors.

<div style="text-align: center; margin: auto">
<img src="{{site.baseurl}}/assets/images/trigonometry_mouse_check_3.webp"><br />
</div>

<hr class="space">

Finally, the angles are compared with the 45.0º threshold value, and if any of the angles is bigger than this hardcoded value, malware treats the result as being suspicious and does not execute the malicious code.

<hr class="space">

<b>Countermeasures</b>
<p></p>

Implement the module for mouse movement during a sample emulation.
Implement the module for mouse movement during a sample emulation. Make sure to come up with a more delicate way of interacting with the mouse cursor rather than just random movements all around the screen, so that it resembles the behavior of a human being.

<br />
<h4><a class="a-dummy" name="check-via-request-for-user-interaction">2.2. Check via a request for user interaction</a></h4>
Expand Down
Binary file added assets/images/trigonometry_mouse_check_1.webp
Binary file not shown.
Binary file added assets/images/trigonometry_mouse_check_2.webp
Binary file not shown.
Binary file added assets/images/trigonometry_mouse_check_3.webp
Binary file not shown.

0 comments on commit de787b4

Please sign in to comment.