Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positives i.e. "NOT A VIRUS!!!!!" #95

Closed
DavidXanatos opened this issue Jul 14, 2020 · 40 comments
Closed

False positives i.e. "NOT A VIRUS!!!!!" #95

DavidXanatos opened this issue Jul 14, 2020 · 40 comments
Labels
already fixed Already fixed at some point false positive False security alerts from third-party companies

Comments

@DavidXanatos
Copy link
Member

The SbieDrv.sys driver must be signed, and since the appropriate certificates are prohibitively expensive, I head to use a leaked code signing certificate I found laying around the Internets. This means some anti malware applications wrongfully flag it as potentially dangerous or a virus.

If you want SandboxiePlus to get a proper EV-Code Signing Certificate please support the project through donations. You can donate via paypal at https://xanasoft.com/ or patreon https://www.patreon.com/DavidXanatos

@DavidXanatos DavidXanatos pinned this issue Jul 14, 2020
@osmirog
Copy link

osmirog commented Jul 17, 2020

Can you please post this on chocolatey? The Virustotal analysis there looks pretty scary, and I saw it after I had already installed the package, so I nearly got a heart attack.)

@rdar-lab
Copy link

Even with the proper founds, I am not sure you will be able to get an EV certificate without a registered company behind the request.
A better workaround, for now, will be to create a custom CA (you can use Microsoft CA) and to generate a code signing certificate using that CA. A user who wishes to use the installer will have to first install the CA public key on his machine's root certificate authorities before installing (or the installer can do it for you). The benefits are that most chances are that the package will not be flagged as a virus. The downside is that a user installing that CA on his machine will really need to trust you not to misbehave and to keep the private key of the CA very safe and secure.

@quangkieu
Copy link

I think Tap network driver bundle in Openvpn for win also attached their own CA publisher and install that before main driver. Windows would show dialog that requesting to install custom CA

@Valinwolf
Copy link

Pardon my ignorance, but is there a reason you couldn't use an SV CS cert, like the $85 one from Comodo?

@DavidXanatos
Copy link
Member Author

Pardon my ignorance, but is there a reason you couldn't use an SV CS cert, like the $85 one from Comodo?

Yes: microsoft would nto accept it and would not counter sign the driver hance windows kernel wouldn't load the driver:
https://docs.microsoft.com/en-us/windows-hardware/drivers/dashboard/get-a-code-signing-certificate

@Valinwolf
Copy link

@DavidXanatos lol so as long as you're a Chinese company you can create malicious drivers, but the perfectly valid FOSS developer gets to suffer. Microsoft 10/10. 🙄

@DavidXanatos
Copy link
Member Author

@DavidXanatos lol so as long as you're a Chinese company you can create malicious drivers, but the perfectly valid FOSS developer gets to suffer. Microsoft 10/10. 🙄

Exactly :'(

@jedimasterspaz
Copy link

After I told Windows Defender to allow Sandboxie. I also got a warning, about the same virus being in a temp file. Is that normal?
Screenshot 2020-10-10 10 18 16

@DavidXanatos
Copy link
Member Author

No i don't think it is the file should be created in the program folder directly

@jedimasterspaz
Copy link

I talked to my wife about the code signing; she deals with that at her work.
She was curious about how you did your code signing.
She recommended the Eclipse Foundation that helps open source projects with code signing.
https://www.eclipse.org/org/
I'm also including the https://opensource.com/resources/organizations.
Lastly, I sent a request to DigiCert about getting a reduced price or donation for a cert.

@Thordin
Copy link

Thordin commented Oct 11, 2020

Even with the proper founds, I am not sure you will be able to get an EV certificate without a registered company behind the request.
A better workaround, for now, will be to create a custom CA (you can use Microsoft CA) and to generate a code signing certificate using that CA. A user who wishes to use the installer will have to first install the CA public key on his machine's root certificate authorities before installing (or the installer can do it for you). The benefits are that most chances are that the package will not be flagged as a virus. The downside is that a user installing that CA on his machine will really need to trust you not to misbehave and to keep the private key of the CA very safe and secure.

I think this would be a better solution. Windows Defender automatically quarantines this driver and probably turns off a lot of people from using it.

@DavidXanatos
Copy link
Member Author

Even with the proper founds, I am not sure you will be able to get an EV certificate without a registered company behind the request.
A better workaround, for now, will be to create a custom CA (you can use Microsoft CA) and to generate a code signing certificate using that CA. A user who wishes to use the installer will have to first install the CA public key on his machine's root certificate authorities before installing (or the installer can do it for you). The benefits are that most chances are that the package will not be flagged as a virus. The downside is that a user installing that CA on his machine will really need to trust you not to misbehave and to keep the private key of the CA very safe and secure.

To my knowledge this won't work MSFT does not allow the user on a system that is not in Test Mode to load code into the kernel that is not MSFT approved.

Se here: https://www.geoffchappell.com/notes/windows/license/customkernelsigners.htm?tx=9
The only windows version on which this works is the China Governmental Edition and it requiters the use of UEFI secure boot to pass the key to the windows kernel.
The windows kernel does not care for the certificate store for its root o trust as far as I know.

@DavidXanatos
Copy link
Member Author

Some one else had the same issue,
Possibly the obfuscation is not good enough or now they trigger on the modified kmdutill.exe...
Could you send me the Fles from your temp folder for examination.

@DavidXanatos
Copy link
Member Author

So you have a "old school" certificate for direct driver signage? Nice.
Although
1.) Win 10 run with secure boot (unless it was an upgrade from an old w10 version) wont to my knowledge accept it and
2.) https://docs.microsoft.com/en-us/windows-hardware/drivers/install/deprecation-of-software-publisher-certificates-and-commercial-release-certificates#what-will-happen-to-my-existing-signed-driver-packages
drivers signed in a few months with it won't be accepted by windows 10 eider.
So such a cert is only a solution for the next half a year or so.

@jedimasterspaz
Copy link

I submitted false-positive check requests to most of the Anti-virus programs that listed SbieDrv.sys as bad, in virustotal.com, and Microsft Defender too.
What sight would you prefer the donation to be sent through?
My wife and I appreciate your work and will send you $60.
I hope you are getting plenty of donations.
Lastly, did you have a chance to look at the Eclipse Foundation?

@Valinwolf
Copy link

@DavidXanatos Correct me if I'm misinterpreting the article, but you'll have to get an EV cert and submit the code to M$?

@DavidXanatos
Copy link
Member Author

I submitted false-positive check requests to most of the Anti-virus programs that listed SbieDrv.sys as bad, in virustotal.com, and Microsft Defender too.
What sight would you prefer the donation to be sent through?
My wife and I appreciate your work and will send you $60.
I hope you are getting plenty of donations.
Lastly, did you have a chance to look at the Eclipse Foundation?

I did not get answer yet from them,
about the donations, there is a paypal donate button on my very incomplete website: https://xanasoft.com

@DavidXanatos Correct me if I'm misinterpreting the article, but you'll have to get an EV cert and submit the code to M$?

Yes that's how it now works, a lot of hassle just to take away a bit more freedom from the users, but there is no easy mass compatible way around it.

@jedimasterspaz
Copy link

Yes Microsoft.
Submission details Refreshsbiedrv.sys
Status: Completed
Submitted: Oct 15, 2020 3:05:58 PM
User Opinion: Incorrect detectionAnalyst comments:

We have removed the detection. Please follow the steps below to clear cached detection and obtain the latest malware definitions.

  1. Open command prompt as administrator and change directory to c:\Program Files\Windows Defender
  2. Run “MpCmdRun.exe -removedefinitions -dynamicsignatures”
  3. Run "MpCmdRun.exe -SignatureUpdate"

Alternatively, the latest definition is available for download here: https://www.microsoft.com/en-us/wdsi/definitions

Thank you for contacting Microsoft.

Have a good night, I have to get to bed.
And thank you so much for working on Sandboxie.
It has saved my customers from the FBI virus and a Crytpoware virus.

@jedimasterspaz
Copy link

Fortinet said oops and sorry.
I'll keep you updated as each one says OK.

2 software companies didn't want to change their mind, so I pushed back with the Microsoft acceptance.

@jedimasterspaz
Copy link

I'm playing with installing Sandboxie and telling Eset NOD32 to exclude c:\program files\sandboxie\sbiedrv.sys.
I got the following hit from NOD32 on the temp file we talked about earlier.
Time;Scanner;Object type;Object;Detection;Action;User;Information;Hash;First seen here
10/16/2020 8:41:40 PM;Real-time file system protection;file;C:\WINDOWS\TEMP\UDD2D16.tmp
;a variant of Win32/Agent.ABZW.gen trojan;cleaned by deleting;NT AUTHORITY\SYSTEM;Event occurred on a file modified by the application: C:\Windows\System32\svchost.exe (010DB07461E45B41C886192DF6FD425BA8D42D82).;1C25F411957728524F07A81256F420DF28DD1DF6;10/16/2020 7:56:30 PM
Multiple files were created and I changed the extension from tmp to txt so it would upload.
UDD2506.txt

@DavidXanatos
Copy link
Member Author

As it looks its just the SbieDrv.sys file, not sure why it ends up in that temp location though

@quangkieu
Copy link

I got the same hit in temp folder, which is NOT where sandboxie stored, from Windows Defender last month or so. I could not re-produce it though.

@DavidXanatos
Copy link
Member Author

The file posted above is just the driver however it ended up there its not a reason to worry about as its harmless.

@jedimasterspaz
Copy link

Eset replied with basically no cert, no pass.

@jedimasterspaz
Copy link

Avast said that it will continue to mark it bad because of the digital signature was revoked.

@ghost
Copy link

ghost commented Oct 22, 2020

I'm having issues with it working, even when allowed in Windows Defender.
For a while it used to work no problem but now all that happens is the Sandboxie icon gives me the ! and when I try and open it it says "something something SbieDrv", basically that Windows Defender still blocks it even though it worked before, had an exception set to it and so on.

I know this post isn't at all helpful with this whole issue but I really hope you can get that certification thingy done sometime soon.
I just love Sandboxie, I've been using it for years to keep my PC save from anything that might seem dodgy when requiring an install.
Just wanting to let you know that I really appreciate you keeping the project alive!

@tasty0tomato
Copy link

Again, the new release is marked as a trojan in Windows Defender

@nyomen
Copy link

nyomen commented Nov 7, 2020

Solve this and sell that stuff for money - Problem solved.
I would easily pay 30-50 $ per year for this software.
There are thousands of ppl out there. Get that company, solve the issue and buy what you need.... Its not that hard if you think about it.

@tasty0tomato
Copy link

Again, the new release is marked as a trojan in Windows Defender

I tried WD and Avira, and they didn't pass, but Kapersky passed.

@hoffr
Copy link

hoffr commented Nov 17, 2020

What's the status on the EV? Not to be nosey of course, but it would be nice if there were a more transparently laid out milestone progress indicator somewhere on the funds needed for a annual EV. I would like to donate, but I do want to be sure I'm donating explicitly to the sole purpose of purchasing an EV cert for Sandboxie Plus. Maybe a Gofundme would be more appropriate?

@Tridens92
Copy link

I agree with @hoffersrc , and think it would be great if there was some sort of way to track towards a goal of an EV. I would also donate to this.

@Alceatraz
Copy link

Even with the proper founds, I am not sure you will be able to get an EV certificate without a registered company behind the request.
A better workaround, for now, will be to create a custom CA (you can use Microsoft CA) and to generate a code signing certificate using that CA. A user who wishes to use the installer will have to first install the CA public key on his machine's root certificate authorities before installing (or the installer can do it for you). The benefits are that most chances are that the package will not be flagged as a virus. The downside is that a user installing that CA on his machine will really need to trust you not to misbehave and to keep the private key of the CA very safe and secure.

The EV cert request is very sick, I mean strict (lol
So after the cert outdate, Things will get really screwed

@DavidXanatos
Copy link
Member Author

So since we have an EV now i can close this issue

@kristofmulier
Copy link

Hi @DavidXanatos ,
We at Embeetle (https://embeetle.com) had the exact same problem. We're acquiring an EV-certificate from Sectigo, which should indeed solve the problem to some extent - at least the false positive flags from Windows.

However, I'm also concerned about false positives from Antivirus software (Norton/Symantec, McAfee, ...). The VT Monitor service from VirusTotal looks like a great solution (see https://www.virustotal.com/gui/monitor-overview), but it might be prohibitively expensive for commercial use.

How did you solve this (antivirus false positives) for Sandboxie?

Kind regards,
Kristof Mulier

@DavidXanatos
Copy link
Member Author

How did you solve this (antivirus false positives) for Sandboxie?

Aside of properly signing the driver and using a generic installer, I did not do anything.

IMHO: this all Anti malware fool industry is one huge scam, and apparently with VT Monitor they advanced from selling snake-oil to out right extortion.

The EU or US should make them liable for false positives.

@DavidXanatos
Copy link
Member Author

PS: please don't expect to much from the EV Cert we have one from Globalsign for the driver, and I tried what VT says when I sign the sandboxie installers.
The false positives went from 16 to 12 on the 32 bit installer and iirc were unchanged on the 64 bit one, although the later were only 1 or 2

@kristofmulier
Copy link

Thank you @DavidXanatos for your quick reply 👍

We don't have installers. Our software is zipped in a .zip and a .7z file - the user can choose which one to download. I've experienced that Norton Antivirus automatically doesn't mind the download itself, but it automatically starts to delete .exe and .pyd files (compiled Python files) as soon as you unpack the zip-file.

Aside of properly signing the driver and using a generic installer, I did not do anything.

Should we use a generic installer too? Would that help our case (avoiding trigger-happy Antivirus software) - or would it make no difference?

I tried what VT says when I sign the sandboxie installers.

What did VT say? I suppose VT == VirusTotal?

Thanks a lot for your help.

@DavidXanatos
Copy link
Member Author

@kristofmulier In my case the problem was VT == VirusTotal reporting substantially more false positives for the installer than for the files contained within it. And strangely only for the 32 bit one.

If you have problems with the files themselves changing the installer will presumably not help. Also I don't know if you can even sign a *.pyd file.

What did VT say?

The false positives went from 16 to 12 on the 32 bit installer and iirc were unchanged on the 64 bit one, although the later were only 1 or 2

So short of complaining with the companies behind those fools that produced false positives I don't think there is a real remedy. The certificate clearly did not impress most of them.

Presumably if you sign your files and complain with the companies you may not need to complain each time you make a new release as they may possibly white-list your certificate.

@kristofmulier
Copy link

kristofmulier commented Jan 2, 2021

Hi @DavidXanatos ,
Thanks for your reply.

If you have problems with the files themselves changing the installer will presumably not help.

That's what I actually thought - but I'm glad to have your confirmation.

I don't know if you can even sign a *.pyd file.

Ugh, that would be terrible! Norton Antivirus flags and auto-deletes all our *.pyd files. We've got hundreds of them. I've posted a StackOverflow question regarding this issue here:
https://stackoverflow.com/questions/65541913/is-it-possible-to-code-sign-a-pyd-file-for-windows

Short of complaining with the companies behind those fools that produced false positives I don't think there is a real remedy.

Seems like you're right - unfortunately. I still hope there is some deliverance from the VirusTotal VT Monitor service. I'll let you know if I can figure something out.

Presumably if you sign your files and complain with the companies you may not need to complain each time you make a new release as they may possibly white-list your certificate.

That would be awesome - at least if we could sign our *.pyd files. Otherwise we're still in trouble.

Thanks for your help :-)

@cuonguet

This comment was marked as off-topic.

@isaak654 isaak654 added false positive False security alerts from third-party companies already fixed Already fixed at some point labels Jun 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
already fixed Already fixed at some point false positive False security alerts from third-party companies
Projects
None yet
Development

No branches or pull requests