Automating Malware Analysis

Post on 16-Jan-2017

723 views 0 download

Transcript of Automating Malware Analysis

Automating Malware Analysis

Execute malware in a controlled/monitored environment Monitors file system, registry, process and network activity Outputs the results in mutiple formats Examples of Sandboxes

◦ Cuckoo Sandbox◦ ThreatExpert◦ Anubis◦ CWSandbox

Sandbox Overview

To determine: The nature and purpose of the malware Interaction with the file system Interaction with the registry Interaction with the network To determine identifiable patterns

Why Sandbox Analysis?

Sandbox Architecture

Reports

Controller

Reports Artifacts

PCAPS

Host Machine Analysis Machine (VM)

LaunchSample

Samples

Sub

mit

Monitoring tools

Automates static, dynamic and Memory analysis using open source tools Written in python Can be run in sandbox mode or internet mode In sandbox mode it can simulate internet services (this is the default

mode) Allows you to set the timeout for the malware to run (default is 60

seconds) Stores final reports, pcaps, desktop screeshot , and malicious artifacts

for later analysis

Custom Sandbox – sandbox.py

Takes sample as input Performs static analysis Reverts VM to clean snapshot Starts the VM Transfers the malware to VM Runs the monitoring tools ( to monitor process, registry, file system,

network activity) Executes the malware for the specified time

Sandbox.py (working)

Stops the monitoring tools Suspends the VM Acquires the memory image Performs memory analysis using Volatility framework Stores the results (Final reports, destkop screenshot, pcaps and malicious

artifacts for later analysis)

Sandbox.py (working contd)

Video Demo (Analysis of Prolaco)

Executing the sample prolaco.exe

Prolaco.exe drops two files on “Googlxe.exe” and “Rundll45.exe” on the filesystem

Disables Security ProductsPrevents the security products from running by looking for the security products and deleting its registry key value

Sends SpamThe malware sends spam invitation mails to the some of the organizations

Hides the processProcess id 1080 sends the spam, but the rootkits hides that process from the process listing using DKOM technique

Hides Process from security toolHides the process from process explorer

Detecting the hidden processComparing the process listing using Volatility’s “pslist” and “psscan” plugin, shows the hidden process

prolaco.exe (pid 1080)

pslist psscan

Dumping the hidden processDumping the hidden process from memory and submitting to VirusTotal confirms the presence of malicious hidden

process