SlideShare a Scribd company logo
1 of 34
0BOX ANALYZER:AFTERDARK RUNTIME FORENSICS FOR AUTOMATED MALWARE ANALYSIS AND CLUSTERING JEREMY CHIU, ARMORIZE TECHNOLOGIES BENSON WU, ARMORIZE TECHNOLOGIES WAYNE HUANG, ARMORIZE TECHNOLOGIES 2010-0801
About Us Jeremy Chiu (aka Birdman), from Taiwan, Security Researcher, X-Solve Lab Armorize, currently Malware Analyst at Armorize Technologies.  His research work is focused on Malware behavior analysis, reverse engineering and development of automatic malware inspection and forensics tools. He has spoken at some security conferences, SySCAN TW(09 08), Hacks in Taiwan (07 06 05), HTICA(06 08) and OWASP Asia (08 07) Benson Wu, PhD, CSSLP, ECSP, from Taiwan, currently Director of RD and Product Line at Armorize Technologies. Wayne Huang, also from Taiwan, cofounder, President and CTO at Armorize Technologies @waynehuang
惡 Malware, Botnet
肉雞
Wow! Anti-XXX
Popular Sandbox Detection Methods  VM/Emulator Detection IDT,LDT Base address Detection Device Detection CPUID, MAC Address, Hard Disk Model, PCI Device VM Backdoor command Windows/Environment Detection Specific Service/Process Name Detection SSDT/API Hooking Detection Windows Production ID Detection
Defeating AntiVirus/HIPS Attacking The Monitors Restore SSDT HooK Unload Notify Routine of Process, Thread, Image, Registry Unload File System Filter Restore FSD Hook Unload TDIFilter  Remove NTFS attached Devices  Bypassing The Recovery System Raw Disk Access
MalwareBehavior Analysis Network Based Approach Monitor DNS/IP Query Traffic Analysis Host Based Approach VM + ProcMon/FileMon… Cwsandbox,anubis,joebox,threatexpert,norman
Malware Runtime Forensics Runtime Forensics focus on the environment after Malware had executed, it has the following advantages: No Monitors No Hooking No Unpacking Nothing to be defeated!
Which Features We Focused?  When Malware interacts with the surrounding environment, it leaves toolmarks, which could be features for behavior modeling. There are three main aspects of features: Installation Remnants Memory Layout  Symptoms of Malicious Behavior
Inspecting the Process Search Process List For Hidden Process Check ScanPspCidTable Scan EPROCESS Structure Search Service List Scan SCM Table (Service Control Manager) Inspect Process Fetch DLL List from LDR Analyze the memory layout and the structures of process Scan Code Block (Stealth Code) Disassemble the Suspicious Code
Identify the Suspicious DLLs LoadLibrary() No straightforward evidence to show the injected DLLs Especially in forensics approach, we only got the final snapshot of the infected environment First, identify the explicitly linked DLL Check LDR,Scan Import Table Also, search PE Image Memory Scan Process Implicitly linked DLL-A DLL-Malware DLL-B DLL-C
Malware Forensics Report Process Inspection Module (e.g. DLL) Inspection ,[object Object]
PE Packer Signature Checking
Code Disassembly
Strings Extraction
File Inspection (for hidden file)Malware Process Malicious Module 1 Malicious Module 2 Malicious Module 3
Case 1: Bifrost (彩虹橋) Bifrost variant from China Stealth Code Injection 請問 ??
Case 2: GhostNet (鬼網) From China www.nartv.org/mirror/shadows-in-the-cloud.pdf Bot Command ….
Case 3: dnf666.net Mass SQL attack Mar 7th2010  http://202.109.143.XX:81/ma.exe (still alive), the online game password Stealer http://blog.armorize.com/2010/06/dnf-group-is-back-mass-sql-injections.html
Case 4: Zeus Bot
Zeus Bot Reference: http://en.wikipedia.org/wiki/Zeus_(trojan_horse) "Zeus: King of the Bots" . Symantec. Retrieved February 20, 2010. Botnet size = 3.6 million
Malware Clustering
Why Clustering …Obvious! Group 2 Group 1
Malware Similarity Matrix A similarity matrix is a matrix of scores which express the similarity between two data points.
Build The Malware Similarity Matrix Feature Extraction: Installation Remnants Memory Layout Behavior Evidence Malware Vi ->{ S(i,0), S(i,1) ..S(i,n)} F = {Fa, Fb, Fc} Forensics Report Malware Similarity
Zer0-Box Automated Malware Analysis and Clustering System Malware Forensics Zer0-Box Malware Forensics Engine Malware Malware Similarity Matrix Forensics Report Malware Clustering Group 1 Group 2 Group 3
Experiment – Live Sample Test 408 Malware Live Samples, All the samples were collected in the wild (2010-07-08, from HackAlert and www.malwaredomainlist.com) Norton: 81/408 = 19.8% Avira: 204/408 = 52.4% ….. 408 malware
Examine the first block After K-means Clustering: Examine this block
Take a look at the first block The color patterns can be grouped into 4 smaller blocks.
Hey! Are you here? @_@
Wow~ Zeus Bot ? Based on anti-virus (Aa) report, some tested samples in this block are named to Zbot.
Manually Verify the Version of Zeus To identify Zeus_V1 and Zeus_V2, we searched the bot command strings in these samples. Zeus V1 Patterns Resetgrab, Sethomepage, Unblock_url, Getcerts … Zeus V2 Patterns user_ftpclients_get, user_homepage_set, user_url_unblock, user_certs_get …
The Famous Zeus Bot Family! From this graph, we could know there are 4 Zeus Bot variants, including 3 variants of V2 and 1 variant of V1. V2 V2 V2 V1

More Related Content

What's hot

Semantics aware malware detection ppt
Semantics aware malware detection pptSemantics aware malware detection ppt
Semantics aware malware detection ppt
Manish Yadav
 
Pentesting for startups
Pentesting for startupsPentesting for startups
Pentesting for startups
levigross
 

What's hot (20)

Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
Fast and Generic Malware Triage Using openioc_scan Volatility PluginFast and Generic Malware Triage Using openioc_scan Volatility Plugin
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
Reverse Engineering Android Application
Reverse Engineering Android ApplicationReverse Engineering Android Application
Reverse Engineering Android Application
 
Proactive Clone Recommendation System for Extract Method Refactoring
 Proactive Clone Recommendation System for Extract Method Refactoring Proactive Clone Recommendation System for Extract Method Refactoring
Proactive Clone Recommendation System for Extract Method Refactoring
 
JDD2015: ClassIndex - szybka alternatywa dla skanowania klas - Sławek Piotrowski
JDD2015: ClassIndex - szybka alternatywa dla skanowania klas - Sławek PiotrowskiJDD2015: ClassIndex - szybka alternatywa dla skanowania klas - Sławek Piotrowski
JDD2015: ClassIndex - szybka alternatywa dla skanowania klas - Sławek Piotrowski
 
Malware analysis - What to learn from your invaders
Malware analysis - What to learn from your invadersMalware analysis - What to learn from your invaders
Malware analysis - What to learn from your invaders
 
Advanced malware analysis training session4 anti-analysis techniques
Advanced malware analysis training session4 anti-analysis techniquesAdvanced malware analysis training session4 anti-analysis techniques
Advanced malware analysis training session4 anti-analysis techniques
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Analysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware KitsAnalysis Of Adverarial Code - The Role of Malware Kits
Analysis Of Adverarial Code - The Role of Malware Kits
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...Android reverse engineering: understanding third-party applications. OWASP EU...
Android reverse engineering: understanding third-party applications. OWASP EU...
 
[2014 CodeEngn Conference 10] 정광운 - 안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)
[2014 CodeEngn Conference 10] 정광운 -  안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)[2014 CodeEngn Conference 10] 정광운 -  안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)
[2014 CodeEngn Conference 10] 정광운 - 안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)
 
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an..."Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
 
.NET for hackers
.NET for hackers.NET for hackers
.NET for hackers
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android ApplicationsSteelcon 2015 Reverse-Engineering Obfuscated Android Applications
Steelcon 2015 Reverse-Engineering Obfuscated Android Applications
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Semantics aware malware detection ppt
Semantics aware malware detection pptSemantics aware malware detection ppt
Semantics aware malware detection ppt
 
Pentesting for startups
Pentesting for startupsPentesting for startups
Pentesting for startups
 
How to reverse engineer Android applications
How to reverse engineer Android applicationsHow to reverse engineer Android applications
How to reverse engineer Android applications
 

Viewers also liked

Forensic Analysis and Discovery System
Forensic Analysis and Discovery SystemForensic Analysis and Discovery System
Forensic Analysis and Discovery System
Azri Hafiz
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Security Bootcamp
 
computer forensics
computer forensicscomputer forensics
computer forensics
Akhil Kumar
 

Viewers also liked (15)

Forensic Analysis and Discovery System
Forensic Analysis and Discovery SystemForensic Analysis and Discovery System
Forensic Analysis and Discovery System
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The Enterprise
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
 
Leveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of MalwareLeveraging NTFS Timeline Forensics during the Analysis of Malware
Leveraging NTFS Timeline Forensics during the Analysis of Malware
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 
Investigating Malware using Memory Forensics
Investigating Malware using Memory ForensicsInvestigating Malware using Memory Forensics
Investigating Malware using Memory Forensics
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 

Similar to 0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and Clustering

Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012
Stephan Chenette
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
DeepContentInspection Lato
DeepContentInspection LatoDeepContentInspection Lato
DeepContentInspection Lato
Brian Stoner
 
clash-titans-zeus-spyeye-33393
clash-titans-zeus-spyeye-33393clash-titans-zeus-spyeye-33393
clash-titans-zeus-spyeye-33393
Harshit Nayyar
 

Similar to 0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and Clustering (20)

Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware Lab
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Malware 101 by saurabh chaudhary
Malware 101 by saurabh chaudharyMalware 101 by saurabh chaudhary
Malware 101 by saurabh chaudhary
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
App locker
App lockerApp locker
App locker
 
Super1
Super1Super1
Super1
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 
Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012Watchtowers of the Internet - Source Boston 2012
Watchtowers of the Internet - Source Boston 2012
 
DEFCON 21: EDS: Exploitation Detection System WP
DEFCON 21: EDS: Exploitation Detection System WPDEFCON 21: EDS: Exploitation Detection System WP
DEFCON 21: EDS: Exploitation Detection System WP
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101
 
DeepContentInspection Lato
DeepContentInspection LatoDeepContentInspection Lato
DeepContentInspection Lato
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensics
 
clash-titans-zeus-spyeye-33393
clash-titans-zeus-spyeye-33393clash-titans-zeus-spyeye-33393
clash-titans-zeus-spyeye-33393
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

0box Analyzer--Afterdark Runtime Forensics for Automated Malware Analysis and Clustering

  • 1. 0BOX ANALYZER:AFTERDARK RUNTIME FORENSICS FOR AUTOMATED MALWARE ANALYSIS AND CLUSTERING JEREMY CHIU, ARMORIZE TECHNOLOGIES BENSON WU, ARMORIZE TECHNOLOGIES WAYNE HUANG, ARMORIZE TECHNOLOGIES 2010-0801
  • 2. About Us Jeremy Chiu (aka Birdman), from Taiwan, Security Researcher, X-Solve Lab Armorize, currently Malware Analyst at Armorize Technologies. His research work is focused on Malware behavior analysis, reverse engineering and development of automatic malware inspection and forensics tools. He has spoken at some security conferences, SySCAN TW(09 08), Hacks in Taiwan (07 06 05), HTICA(06 08) and OWASP Asia (08 07) Benson Wu, PhD, CSSLP, ECSP, from Taiwan, currently Director of RD and Product Line at Armorize Technologies. Wayne Huang, also from Taiwan, cofounder, President and CTO at Armorize Technologies @waynehuang
  • 6. Popular Sandbox Detection Methods VM/Emulator Detection IDT,LDT Base address Detection Device Detection CPUID, MAC Address, Hard Disk Model, PCI Device VM Backdoor command Windows/Environment Detection Specific Service/Process Name Detection SSDT/API Hooking Detection Windows Production ID Detection
  • 7. Defeating AntiVirus/HIPS Attacking The Monitors Restore SSDT HooK Unload Notify Routine of Process, Thread, Image, Registry Unload File System Filter Restore FSD Hook Unload TDIFilter Remove NTFS attached Devices Bypassing The Recovery System Raw Disk Access
  • 8. MalwareBehavior Analysis Network Based Approach Monitor DNS/IP Query Traffic Analysis Host Based Approach VM + ProcMon/FileMon… Cwsandbox,anubis,joebox,threatexpert,norman
  • 9. Malware Runtime Forensics Runtime Forensics focus on the environment after Malware had executed, it has the following advantages: No Monitors No Hooking No Unpacking Nothing to be defeated!
  • 10. Which Features We Focused? When Malware interacts with the surrounding environment, it leaves toolmarks, which could be features for behavior modeling. There are three main aspects of features: Installation Remnants Memory Layout Symptoms of Malicious Behavior
  • 11. Inspecting the Process Search Process List For Hidden Process Check ScanPspCidTable Scan EPROCESS Structure Search Service List Scan SCM Table (Service Control Manager) Inspect Process Fetch DLL List from LDR Analyze the memory layout and the structures of process Scan Code Block (Stealth Code) Disassemble the Suspicious Code
  • 12. Identify the Suspicious DLLs LoadLibrary() No straightforward evidence to show the injected DLLs Especially in forensics approach, we only got the final snapshot of the infected environment First, identify the explicitly linked DLL Check LDR,Scan Import Table Also, search PE Image Memory Scan Process Implicitly linked DLL-A DLL-Malware DLL-B DLL-C
  • 13.
  • 17. File Inspection (for hidden file)Malware Process Malicious Module 1 Malicious Module 2 Malicious Module 3
  • 18. Case 1: Bifrost (彩虹橋) Bifrost variant from China Stealth Code Injection 請問 ??
  • 19. Case 2: GhostNet (鬼網) From China www.nartv.org/mirror/shadows-in-the-cloud.pdf Bot Command ….
  • 20. Case 3: dnf666.net Mass SQL attack Mar 7th2010 http://202.109.143.XX:81/ma.exe (still alive), the online game password Stealer http://blog.armorize.com/2010/06/dnf-group-is-back-mass-sql-injections.html
  • 22. Zeus Bot Reference: http://en.wikipedia.org/wiki/Zeus_(trojan_horse) "Zeus: King of the Bots" . Symantec. Retrieved February 20, 2010. Botnet size = 3.6 million
  • 24. Why Clustering …Obvious! Group 2 Group 1
  • 25. Malware Similarity Matrix A similarity matrix is a matrix of scores which express the similarity between two data points.
  • 26. Build The Malware Similarity Matrix Feature Extraction: Installation Remnants Memory Layout Behavior Evidence Malware Vi ->{ S(i,0), S(i,1) ..S(i,n)} F = {Fa, Fb, Fc} Forensics Report Malware Similarity
  • 27. Zer0-Box Automated Malware Analysis and Clustering System Malware Forensics Zer0-Box Malware Forensics Engine Malware Malware Similarity Matrix Forensics Report Malware Clustering Group 1 Group 2 Group 3
  • 28. Experiment – Live Sample Test 408 Malware Live Samples, All the samples were collected in the wild (2010-07-08, from HackAlert and www.malwaredomainlist.com) Norton: 81/408 = 19.8% Avira: 204/408 = 52.4% ….. 408 malware
  • 29. Examine the first block After K-means Clustering: Examine this block
  • 30. Take a look at the first block The color patterns can be grouped into 4 smaller blocks.
  • 31. Hey! Are you here? @_@
  • 32. Wow~ Zeus Bot ? Based on anti-virus (Aa) report, some tested samples in this block are named to Zbot.
  • 33. Manually Verify the Version of Zeus To identify Zeus_V1 and Zeus_V2, we searched the bot command strings in these samples. Zeus V1 Patterns Resetgrab, Sethomepage, Unblock_url, Getcerts … Zeus V2 Patterns user_ftpclients_get, user_homepage_set, user_url_unblock, user_certs_get …
  • 34. The Famous Zeus Bot Family! From this graph, we could know there are 4 Zeus Bot variants, including 3 variants of V2 and 1 variant of V1. V2 V2 V2 V1
  • 35. Experimental Results Among 408Malware samples, we manually verified and found 52 Zeus Bot instances. After automated clustering, these 52 Zeus Bot instances got clustered into 4 groups – 1 group of V1 variant, and 3 groups of V2 variants. Comparing our clustering results and Anti-virus results,26 out of 52 Zeus Bot instances are correctly named after Zbot by Anti-Virus. In this test set, our true positive rate for Zeus bot instances are 100% while anti-virus tools are only 50%. With these Zeus clusters, we can apply automated Malware classification and detection for known and unknown Zeus variants.
  • 36. There are more Malware Families Vundo Family? Bagle Family ?
  • 37. Conclusion Traditional Hooking-Based Monitor approach can hardly defeat anti-analysis techniques used by modern advanced Malware. Instead, usingMalware Runtime Forensics techniques can extract significant features and assure the accuracy and precision of clustering. The experimental results justify that the malware analysis system can be fully automated, does not require human interpretation, and automated clustering effectively resolves the issue of numerous unknown variants.
  • 38. Thank You and Q&A Q&A
  • 39. Abstract The problem with current Malware analysis tools is the monitoring mechanism - there's always a "sandbox" or some type of monitoring mechanism that must be loaded BEFORE malware execution. This allows malware to detect whether such monitoring mechanisms exist, and to bail out thus avoiding detection and analysis. Our approach -- an afterDark analyzer that loads AFTER malware execution. No matter how well a piece of malware hides itself, there will be runtime forensics data that can be analyzed to identify "traces" of a process trying to hide itself. Since analysis is done post mortem, it is very hard for malware to detect the analysis. By using runtime forensics to extract evidences, we turn a piece of malware from its original binary space into a feature space, with each feature representing the existence or non-existence of a certain behavior (ex, process table tampering, unpacking oneself, adding hooks, etc). By running clustering algorithms in this space, we show that this technique is very accurate at clustering the malware into existing malware families. Such clustering is helpful for deciding whether a piece of malware is just a variation or repacking of an existing malware family, or is a brand new find.