automating malware analysis

15
Automating Malware Analysis

Upload: securityxploded

Post on 16-Jan-2017

722 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Automating Malware Analysis

Automating Malware Analysis

Page 2: Automating Malware Analysis

Execute malware in a controlled/monitored environment Monitors file system, registry, process and network activity Outputs the results in mutiple formats Examples of Sandboxes

◦ Cuckoo Sandbox◦ ThreatExpert◦ Anubis◦ CWSandbox

Sandbox Overview

Page 3: Automating Malware Analysis

To determine: The nature and purpose of the malware Interaction with the file system Interaction with the registry Interaction with the network To determine identifiable patterns

Why Sandbox Analysis?

Page 4: Automating Malware Analysis

Sandbox Architecture

Reports

Controller

Reports Artifacts

PCAPS

Host Machine Analysis Machine (VM)

LaunchSample

Samples

Sub

mit

Monitoring tools

Page 5: Automating Malware Analysis

Automates static, dynamic and Memory analysis using open source tools Written in python Can be run in sandbox mode or internet mode In sandbox mode it can simulate internet services (this is the default

mode) Allows you to set the timeout for the malware to run (default is 60

seconds) Stores final reports, pcaps, desktop screeshot , and malicious artifacts

for later analysis

Custom Sandbox – sandbox.py

Page 6: Automating Malware Analysis

Takes sample as input Performs static analysis Reverts VM to clean snapshot Starts the VM Transfers the malware to VM Runs the monitoring tools ( to monitor process, registry, file system,

network activity) Executes the malware for the specified time

Sandbox.py (working)

Page 7: Automating Malware Analysis

Stops the monitoring tools Suspends the VM Acquires the memory image Performs memory analysis using Volatility framework Stores the results (Final reports, destkop screenshot, pcaps and malicious

artifacts for later analysis)

Sandbox.py (working contd)

Page 8: Automating Malware Analysis

Video Demo (Analysis of Prolaco)

Page 9: Automating Malware Analysis

Executing the sample prolaco.exe

Prolaco.exe drops two files on “Googlxe.exe” and “Rundll45.exe” on the filesystem

Page 10: Automating Malware Analysis

Disables Security ProductsPrevents the security products from running by looking for the security products and deleting its registry key value

Page 11: Automating Malware Analysis

Sends SpamThe malware sends spam invitation mails to the some of the organizations

Page 12: Automating Malware Analysis

Hides the processProcess id 1080 sends the spam, but the rootkits hides that process from the process listing using DKOM technique

Page 13: Automating Malware Analysis

Hides Process from security toolHides the process from process explorer

Page 14: Automating Malware Analysis

Detecting the hidden processComparing the process listing using Volatility’s “pslist” and “psscan” plugin, shows the hidden process

prolaco.exe (pid 1080)

pslist psscan

Page 15: Automating Malware Analysis

Dumping the hidden processDumping the hidden process from memory and submitting to VirusTotal confirms the presence of malicious hidden

process