The development of a contained and user emulated malware assessment platform
Siebe Hodzelmans & Frank Potter
The development of a contained and user emulated malware assessment - - PowerPoint PPT Presentation
The development of a contained and user emulated malware assessment platform Siebe Hodzelmans & Frank Potter (TechCrunch, 2012) 2/23 Incident Response and Malware Analysis (Debrie, Lone-Sang, and Quint, 2014) 3/23 (ArsTechnica, 2017)
Siebe Hodzelmans & Frank Potter
(TechCrunch, 2012)
2/23
3/23
(Debrie, Lone-Sang, and Quint, 2014)
(ArsTechnica, 2017)
4/23
(Times Square Chronicles, 2019)
5/23
6/23
the red team’s malware to the AV vendor?
emulated detection rates?
7/23
8/23
9/23
10/23
11/23
(Kamali, 2016)
12/23
○ McAfee, Symantec and Trend Micro ○ Later Kaspersky
○ Installation, registration, updating ○ Analytical data ○ Lots of hashes and encoded data ○ Only HTTP(S)
13/23
○ Trend Micro: missing SNI, long plain HTTP GET ○ McAfee: every file gets hashed, google analytics ○ Symantec: ping submission with data buffer ○ Kaspersky: lot of HTTP(S) 400 and 502 errors, certificate pinning
14/23
15/23
Das Malwerk Deloitte obfuscated Deloitte direct exports 1e84- ff45 1f7b- 55c7 230a- 6f87 266a- 11f5 2578- 6c51
exe
1
2 beacon exe beacon dll msf vnm McAfee
✔ ✔ ✔ ✔ ✔
Symantec
✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Trend Micro
✖ ✔ ✔ ✔ ✔ ✔ ✔
Kaspersky
✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
○ Difference Trend Micro ○ Warning Symantec
○ Unsure what to block ○ Updates can change endpoints
○ Robust ○ Parameters: ■ hostnames ■ traffic size and direction ■ content
16/23
○ pywinauto, accessibility API ○ pyautogui, mouse and keyboard, screenshots
○ Malware infection Tree ○ File handles, process tree structure
17/23
18/23
19/23
○ Insecure connections ○ Kaspersky errors
○ Unable to trigger sample submission ○ Flaw in research design ○ Based on what we did observe
20/23
○ But no sample submission
○ User emulation matches manual ○ Multiple approaches to emulation
21/23
How can malware be tested for detection
by emulating user actions, without the AV vendor learning about the malware?
○ Another approach: reverse engineering
22/23
23/23