Atom Tables?

If it's not about a problem in the program
Post Reply
Syrinx
Sandboxie Guru
Sandboxie Guru
Posts: 620
Joined: Fri Nov 13, 2015 4:11 pm

Atom Tables?

Post by Syrinx » Thu Oct 27, 2016 2:59 pm

Atom Tables, first I've heard of them but there seems to be way to abuse them:
http://blog.ensilo.com/atombombing-a-co ... -solutions
AtomBombing is performed just by using the underlying Windows mechanisms. There is no need to exploit operating system bugs or vulnerabilities.

Since the issue cannot be fixed, there is no notion of a patch for this. Thus, the direct mitigation answer would be to tech-dive into the API calls and monitor those for malicious activity.
Can Sandboxie do anything to stop this or perhaps it already does?
Goo.gl/p8qFCf

Syrinx
Sandboxie Guru
Sandboxie Guru
Posts: 620
Joined: Fri Nov 13, 2015 4:11 pm

Re: Atom Tables?

Post by Syrinx » Thu Oct 27, 2016 11:30 pm

Wanted to update the thread but it timed out so here I go:

Found a little more detailed info on it and while it's still a bit over my head it seems that something would need to run [the run restrictions available in sandboxie would help to mitigate it here] and use an ROP chain[which might be blocked by sandboxie's current memory write protection schemes but I can't say for sure]. So until someone uses it in the wild or releases an easy to test PoC then I guess it's a more than likely Sandboxie would stop it. An Anti-Exploit that deals with the ROP stage would also hopefully detect and prevent it.
Goo.gl/p8qFCf

RonC
Posts: 245
Joined: Thu Jul 27, 2006 2:07 pm
Location: Funchal, Madeira

Re: Atom Tables?

Post by RonC » Wed Nov 02, 2016 7:38 am

:?: If an infected executable were to be accidentally run during a sandboxed session, would the modified atom tables be returned to their prior status -- when the sandbox is dumped?

If yes, then this would be an adequate precaution, for this kind of attack, to be taken before doing any critical activity, e.g., online banking?

:!: Would be nice if Alan or Curt could 'chime in' here.
RonC
Windows 7 Pro SP1 (32-bit)

Conadan
Posts: 10
Joined: Thu Apr 17, 2014 8:27 pm

Re: Atom Tables?

Post by Conadan » Wed Nov 02, 2016 8:32 am

RonC wrote::?: If an infected executable were to be accidentally run during a sandboxed session, would the modified atom tables be returned to their prior status -- when the sandbox is dumped?
I think you are asking the wrong question. Atom tables are only used in this attack to make other processes run malicious code. Even if these tables are restored, other programs that might be outside Sandboxie could have already gotten the malicious code from these table and already done harm to your system.

I myself have no idea if Sandboxie isolates these atom tables, but if it doesn't this could be a very effective way of bypassing Sandboxie. Hope someone from Sandboxies team could give an answer :)

Curt@invincea
Sandboxie Lead Developer
Sandboxie Lead Developer
Posts: 1638
Joined: Fri Jan 17, 2014 5:21 pm
Contact:

Re: Atom Tables?

Post by Curt@invincea » Thu Nov 03, 2016 5:45 pm

The "AtomBombing" technique described by these authors involves adding malicious code to the global atom table, and getting a process to execute this code by some injection technique (such as QueueUserApc). Sbie blocks injection outside the sandbox. So these techniques will not work with a sandboxed process.

Post Reply

Who is online

Users browsing this forum: No registered users and 1 guest