×

Detecting malicious files

  • US 9,928,364 B2
  • Filed: 05/09/2016
  • Issued: 03/27/2018
  • Est. Priority Date: 05/20/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving a candidate file from a client;

    obtaining a basic information associated with the candidate file through analyzing the candidate file;

    encrypting the candidate file;

    storing the basic information associated with the candidate file to a database and storing the encrypted candidate file to a file server;

    receiving a file checking task, wherein the file checking task comprises a storage address of the candidate file and the basic information associated with executing the candidate file;

    sending the file checking task to a detection device, wherein the file checking task causes the detection device to;

    use the storage address to acquire the candidate file from the file server;

    execute the candidate file based at least in part on the basic information associated with the candidate file;

    monitor the execution of the candidate file; and

    generate a monitored action record corresponding to the execution of the candidate file;

    receiving the monitored action record from the detection device, wherein the monitored action record comprises an action associated with one or more of the following;

    a file creation function, a file deletion function, an information changing function, a registration table creation function, and a registration table value setting function;

    determining a set of actions included in the monitored action record that matches one or more action types included in a preset malicious action set; and

    determining whether the candidate file is a malicious file based at least in part on the determined set of actions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×