Skip to content

diorwave/Anti-Virus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Malware Detection & Containment System

A professional-grade Windows malware detection and containment application designed to compete with commercial EDR solutions. Prioritizes safety, accuracy, and controlled remediation over aggressive deletion.

🎯 Key Features

Real-Time Detection

  • ETW-based monitoring: Event-driven detection of service creation, file operations, and process execution
  • Signature validation: Authenticode verification for all executables
  • Behavioral analysis: Clipboard hijacking and screen capture detection
  • Heuristic scoring: Multi-factor threat assessment

Safe Containment

  • Process suspension: Freeze malicious processes without termination
  • Execution blocking: NTFS ACL-based prevention
  • Network isolation: Windows Firewall integration
  • Service disabling: Prevent malicious service restart
  • Persistence removal: Clean registry, scheduled tasks, startup folders

Controlled Remediation

  • Quarantine system: Isolate threats without deletion
  • Boot-time removal: Schedule deletion for locked files
  • Offline remediation: Windows Defender Offline integration
  • Manual confirmation: Never delete without user approval

Threat Intelligence

  • Detects fake system binaries (sihostw.exe vs sihost.exe)
  • Identifies unsigned executables in System32/SysWOW64
  • Flags 32-bit processes masquerading as system processes
  • Detects PSEXESVC without legitimate PsExec
  • Identifies clipboard hijackers and screenshot capture malware

🛡️ Safety Guarantees

What This System NEVER Does

  • ❌ Delete files immediately upon detection
  • ❌ Delete Microsoft-signed binaries
  • ❌ Delete from System32 without offline context
  • ❌ Proceed without user confirmation
  • ❌ Damage Windows system files

What This System ALWAYS Does

  • ✅ Contain threats before deletion
  • ✅ Require manual confirmation for remediation
  • ✅ Provide rollback capability
  • ✅ Log comprehensive forensic details
  • ✅ Warn users of credential compromise

📋 Requirements

  • Windows 10/11 (64-bit)
  • .NET 6.0 Runtime
  • Administrator privileges
  • 100MB disk space
  • 2GB RAM minimum

🚀 Quick Start

Build

dotnet build -c Release

Run

# Must run as Administrator
.\bin\Release\net6.0-windows\MalwareDefense.exe

Install as Service (Optional)

sc create MalwareDefense binPath= "C:\Path\To\MalwareDefense.exe"
sc config MalwareDefense start= auto
sc start MalwareDefense

📊 Detection Capabilities

Signature-Based Detection

  • Unsigned binaries in protected paths (Score: 50)
  • Non-Microsoft signatures in System32 (Score: 40)
  • Revoked or expired certificates (Score: 35)

Name Mimicry Detection

  • Typosquatting patterns (Score: 45)
  • System processes in wrong locations (Score: 35)

Service-Based Detection

  • PSEXESVC without PsExec (Score: 50)
  • Services from suspicious locations (Score: 30)

Behavioral Detection

  • Clipboard hijacking (Score: 50 - CRITICAL)
  • Screen capture without UI (Score: 45)
  • Keylogger indicators (Score: 50 - CRITICAL)

Threat Levels

  • Suspicious (30-49): Logged and alerted
  • Malicious (50-79): Contained and alerted
  • Critical (80+): Contained, alerted, offline remediation recommended

🔧 Architecture

┌─────────────────────────────────────────────────────────┐
│                   User Interface                        │
│  (Tray Icon, Alerts, Remediation Console, Dashboard)   │
└─────────────────────────────────────────────────────────┘
                           │
┌─────────────────────────────────────────────────────────┐
│              Malware Defense Engine                     │
│         (Orchestration & Event Handling)                │
└─────────────────────────────────────────────────────────┘
           │              │              │
┌──────────┴──────┐  ┌───┴────────┐  ┌─┴──────────────┐
│  Detection      │  │ Monitoring │  │  Containment   │
│  Engine         │  │ Subsystems │  │  Engine        │
│                 │  │            │  │                │
│ • Signature     │  │ • ETW      │  │ • Process      │
│ • Heuristics    │  │ • WMI      │  │   Suspension   │
│ • Scoring       │  │ • Behavior │  │ • ACL Blocking │
└─────────────────┘  └────────────┘  │ • Network      │
                                      │   Isolation    │
                                      └────────────────┘
           │
┌──────────┴──────────────┐
│  Remediation Controller │
│                         │
│ • Quarantine            │
│ • Boot-time Delete      │
│ • Offline Remediation   │
└─────────────────────────┘

📁 Project Structure

MalwareDefense/
├── src/
│   ├── Core/
│   │   └── MalwareDefenseEngine.cs    # Main orchestrator
│   ├── DetectionEngine/
│   │   └── ThreatDetector.cs          # Threat analysis
│   ├── Monitoring/
│   │   ├── ETWMonitor.cs              # Event Tracing
│   │   ├── ServiceMonitor.cs          # Service monitoring
│   │   └── BehaviorMonitor.cs         # Behavioral detection
│   ├── Containment/
│   │   └── ContainmentEngine.cs       # Safe containment
│   ├── Remediation/
│   │   └── RemediationController.cs   # Controlled removal
│   └── UI/
│       └── AlertSystem.cs             # User notifications
├── ARCHITECTURE.md                     # System design
├── DETECTION_RULES.md                  # Detection logic
├── IMPLEMENTATION_GUIDE.md             # Development guide
├── SECURITY_DISCLAIMER.md              # Legal notice
└── README.md                           # This file

🔍 Usage Examples

Detecting Malware

The system automatically detects threats in real-time. When a threat is detected:

  1. Immediate Containment: Process suspended, network blocked
  2. User Alert: Tray notification with threat details
  3. Forensic Logging: Complete threat report saved
  4. Remediation Options: User chooses next action

Reviewing Threats

# View forensic logs
Get-Content "$env:ProgramData\MalwareDefense\Logs\forensic.log"

# List quarantined files
Get-ChildItem "$env:ProgramData\MalwareDefense\Quarantine"

Manual Remediation

  1. Open remediation console from tray icon
  2. Review threat details and indicators
  3. Choose remediation action:
    • Quarantine only (safest)
    • Delete now (if safe)
    • Boot-time delete (for locked files)
    • Offline remediation (for SYSTEM-level threats)
  4. Confirm action
  5. Verify removal

⚠️ Security Warnings

Clipboard Hijacking Detected

⚠️ CLIPBOARD HIJACKING DETECTED
Any cryptocurrency addresses copied may have been compromised.
Recommendation: Verify all crypto transactions from a clean device.

Screen Capture Detected

⚠️ SCREEN CAPTURE DETECTED
Sensitive information displayed on screen may have been captured.
Recommendation: Change passwords from a clean device.

SYSTEM-Level Compromise

⚠️ SYSTEM-LEVEL COMPROMISE
Attacker had full system access. Assume complete compromise.
Recommendations:
1. Disconnect from network immediately
2. Change all passwords from a clean device
3. Review financial transactions
4. Run offline remediation
5. Consider full system reinstall

🧪 Testing

Unit Tests

dotnet test --filter Category=Unit

Integration Tests

dotnet test --filter Category=Integration

System Tests (Requires Isolated VM)

# Deploy test malware samples
.\tests\deploy-samples.ps1

# Run detection tests
dotnet test --filter Category=System

📈 Performance

  • Detection Latency: < 500ms
  • CPU Usage: < 2% idle, < 10% active
  • Memory: < 100MB
  • Disk I/O: Minimal (event-driven)

🤝 Contributing

This is a security-critical application. Contributions must:

  1. Include comprehensive tests
  2. Follow safety-first principles
  3. Never compromise system stability
  4. Include documentation updates

📄 License

[Your License Here]

⚖️ Legal Disclaimer

This software is provided for defensive security purposes only. Users are responsible for:

  • Compliance with local laws and regulations
  • Proper authorization before deployment
  • Data privacy and retention policies
  • Incident response procedures

CRITICAL: If SYSTEM-level spyware, clipboard hijacking, or screenshot capture is detected, users must assume:

  • All credentials entered on the system are compromised
  • All cryptocurrency transactions may have been intercepted
  • All sensitive data displayed on screen may have been captured
  • Complete system reinstallation may be necessary

📞 Support

  • Documentation: See IMPLEMENTATION_GUIDE.md
  • Detection Rules: See DETECTION_RULES.md
  • Architecture: See ARCHITECTURE.md
  • Issues: [GitHub Issues]
  • Security: Report vulnerabilities privately

🙏 Acknowledgments

  • Microsoft for Windows ETW and security APIs
  • Sysinternals for inspiration on system-level tools
  • Security research community for threat intelligence

Built with safety and accuracy as top priorities. Designed to protect, not to damage.

About

A Windows malware detection and containment app written in .NET. It uses real‑time monitoring, signatures, heuristics and safe remediation to detect threats and protect systems without aggressive deletion.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages