US 12,455,964 B2
Kill chain identifications
Vivek Srivastava, Cambridgeshire (GB); Tobias Edward Sebastian Gray, Cambridgeshire (GB); and Ratnesh Kumar Pandey, Cambridgeshire (GB)
Assigned to Hewlett-Packard Development Company, L.P., Spring, TX (US)
Appl. No. 18/560,807
Filed by Hewlett-Packard Development Company, L.P., Spring, TX (US)
PCT Filed Jul. 23, 2021, PCT No. PCT/US2021/042897
§ 371(c)(1), (2) Date Nov. 14, 2023,
PCT Pub. No. WO2023/003565, PCT Pub. Date Jan. 26, 2023.
Prior Publication US 2024/0289452 A1, Aug. 29, 2024
Int. Cl. G06F 21/53 (2013.01); G06F 9/455 (2018.01); G06F 21/56 (2013.01)
CPC G06F 21/56 (2013.01) [G06F 9/45558 (2013.01); G06F 2009/45587 (2013.01); G06F 2221/034 (2013.01)] 11 Claims
OG exemplary drawing
 
1. A non-transitory computer-readable storage medium storing thereon instructions that, when executed, cause a processor of a computing device to:
receive an indication associated with a first virtual machine, the first virtual machine containing a first application, the indication indicating that a first operation in the first virtual machine is to use a second application;
receive information associated with a second virtual machine, the second virtual machine created in response to the first operation and containing the second application;
store information describing a chain of virtual machines, the chain of virtual machines including the first and second virtual machines, the stored information including a relationship between the first virtual machine and the second virtual machine, based on the received indication and the received information; and
in response to an identification of malware in the chain of virtual machines, identify a particular virtual machine in the chain of virtual machines that is in a kill chain of the malware based on the stored information,
wherein the first virtual machine is a primary virtual machine and other virtual machines in the chain of virtual machines are secondary virtual machines, wherein a secondary virtual machine is created in response to an operation in a respective preceding virtual machine in the chain of virtual machines, wherein the stored information stores information on a relationship between a secondary virtual machine and the respective preceding virtual machine,
wherein the instructions, when executed, further cause the processor to:
identify the malware in a virtual machine in the chain of virtual machines,
in response to the identification of the malware in the virtual machine, flag the virtual machine as malicious, and
when a secondary virtual machine is flagged as malicious, determine that its respective preceding virtual machine is in the kill chain of the malware, and flag that preceding virtual machine as malicious.