/
Automated Malware Analysis Automated Malware Analysis

Automated Malware Analysis - PowerPoint Presentation

luanne-stotts
luanne-stotts . @luanne-stotts
Follow
424 views
Uploaded On 2015-10-22

Automated Malware Analysis - PPT Presentation

A Look at Cuckoo Sandbox Introduction What is Malware mãlwâr Malicious computer software that interferes with normal computer functions What is Automated Malware Analysis Taking what has been done by highly skilled professionals in extremely time consuming tasks and making ID: 169254

analysis malware cuckoo machine malware analysis machine cuckoo sandbox automated windows www virtual python tasks time functions data free

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Automated Malware Analysis" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Automated Malware Analysis

A Look at Cuckoo SandboxSlide2

Introduction

What is Malware?

(

mãl'wâr

') -

Malicious

computer software that interferes with normal computer

functions

What is Automated Malware Analysis?

Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.

Why

automate malware analysis?

To free up the time from those highly skilled professionals to focus on other things.Slide3

Difficulties to Overcome

Malware can be generic or targeted, adding that it can be polymorphic, packed or self modifying code, the number of possibilities are infinite

Manual malware analysis is time consuming

Traditional static analysis takes a very strong and specific set of skills

Manually performing dynamic analysis is tedious at bestSlide4

Sandboxing

Protected runtime environment

Containment

Monitoring

Automation

Complete command execution

Ease of UseSlide5

Predicaments of Sandboxing

Commercial solutions are not always cost effective (

FireEye

,

Dambala

)

No guarantee the malware will work the same as in the real world

Sandbox can be detected

Results can be confusing or overwhelming

Automation of exploit analysis is not trivialSlide6

Sandboxing Questions

Why are you doing this?

What do you expect to achieve?

What information is most relevant to me or to my organization?

Who is the intended audience for the results to be presented to?

What kind of malware do you want to analyze (Adobe, Office, browser, etc…)?

Where are the malware samples coming from?Slide7

Cuckoo Sandbox

Open source automated malware analysis system

Uses virtualization (

VirtualBox

, KVM,

VMWare

)

Python based, easy to customize

Multiple report types (JSON, HTML, MAEC)

NOT a drop in replacement for commercial solutions at this point. No automated malware identification or loading

.Slide8

Cuckoo Sandbox Data Captured

Native functions and Windows API calls traces

Copies of files created and deleted from the

filesystem

Dump of the memory of the selected process

Screenshots of the desktop during the execution of the malware analysis

Network dump generated by the machine used for the

analysisSlide9

Cuckoo Components

Scheduler

Analyzer

Cmonitor

Chook

Virtual MachineSlide10

SchedulerMain

component

100% Python, easily customizable

Dispatches the pending tasks to the pool of virtual machines available

Runs all the modulesSlide11

AnalyzerExecutes the malware

Chosen depending on the platform of the selected machine (Windows only at this time)

100% Python

Monitors and records systems calls

Meat of the analysisSlide12

Cmonitor

DLL using chook to install hooks on predefined win32 functions inside process memory

Gets injected into the target process (

QueueUserAPC

or

CreateRemoteThread

)

Logs the functions calls to filesSlide13

ChookCustom inline hooking library

Allows definition of custom hook trampolines

Replaced Microsoft DetoursSlide14

Virtual Machine UsageAny VM product can be used

Works with Windows as the client (though 7 and 2008 server are still buggy)

Snapshots are used and returned to snapshot state when completed (no infected machine left after analysis)

Client VM can have any configuration or applications installed to testSlide15

Execution flowSlide16

Submitting New Tasks

Web Interface

Command Line

Options:

VM to use

Platform (windows only as of v.4)

Timeout

Package

Priority

Malware to be AnalyzedSlide17

Modules and Customization

Analysis

Packages

Machine Managers

Processing

Reporting

SignaturesSlide18

AnalysisAgain 100% Python

Defines how the analyzer should start and interact with the malware

Specified at submission or selected upon file type

Can be written to perform any tasks deemed necessarySlide19

Packages

EXE

Default – Windows

executables

DLL

You can specify a function to use otherwise

DllMain

PDF

Launches Acrobat Reader

DOC or XLS

Office, Need to verify path in package is the same as host OS

IE

HTML/JS Browser testing

BIN

Shell code or other generic binary dataSlide20

Machine Managers

Used to manage the Virtual Machines being used

Processing

Modules used to generate a container of normalized information on the analysis that report generation will useSlide21

Reporting

Use the normalized results and do something with them

Can use

MongoDB

for customized reporting and tracking

Built in report types that include all relevant data

Can pull in data from

VirusTotal

based on MD5Slide22

Signatures

Look for patterns or specific events

Assign them a description and severity level

Give context to the reports

Help non-malware experts understandSlide23

DEMOSlide24

References

Cuckoo Sandbox

 is a 

malware analysis system

.

http://cuckoosandbox.org/

M

alwr.com

 is a free malware analysis

service based on Cuckoo Sandbox

http://www.malwr.com/

VirusTotal

is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms,

trojans

, and all kinds of malware.

https://www.virustotal.com/

Honeynet

Project

is a leading international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security

http://www.honeynet.org

/

The Pros and Cons of Dynamic Malware Dissection

https://www.damballa.com/downloads/r_pubs/WP_Next_Generation_Anti-

Virus.pdf