The development of a contained and user emulated malware assessment - - PowerPoint PPT Presentation

the development of a contained and user emulated malware
SMART_READER_LITE
LIVE PREVIEW

The development of a contained and user emulated malware assessment - - PowerPoint PPT Presentation

The development of a contained and user emulated malware assessment platform Siebe Hodzelmans & Frank Potter (TechCrunch, 2012) 2/23 Incident Response and Malware Analysis (Debrie, Lone-Sang, and Quint, 2014) 3/23 (ArsTechnica, 2017)


slide-1
SLIDE 1

The development of a contained and user emulated malware assessment platform

Siebe Hodzelmans & Frank Potter

slide-2
SLIDE 2

(TechCrunch, 2012)

2/23

slide-3
SLIDE 3

Incident Response and Malware Analysis

3/23

(Debrie, Lone-Sang, and Quint, 2014)

slide-4
SLIDE 4

(ArsTechnica, 2017)

4/23

slide-5
SLIDE 5

(Times Square Chronicles, 2019)

5/23

slide-6
SLIDE 6

Research ques+on

‘How can malware be tested for detection of antivirus software by emulating user actions, without the AV vendor learning about the malware?’

6/23

slide-7
SLIDE 7

Sub questions

  • What traffic is generated by AV software?
  • How to prevent AV software from notifying and submitting

the red team’s malware to the AV vendor?

  • Are there any differences between direct scanning and user

emulated detection rates?

7/23

slide-8
SLIDE 8

Methodology - Traffic analysis

  • McAfee, Symantec and Trend Micro
  • Malware samples

8/23

slide-9
SLIDE 9

9/23

slide-10
SLIDE 10

Methodology - Preventing submission

10/23

slide-11
SLIDE 11

11/23

slide-12
SLIDE 12

Methodology - User emulation

(Kamali, 2016)

  • Compare manual with emulated behavior of malware
  • Web browsing user emulation with pywinauto and pyautogui
  • Malware infection Tree

12/23

slide-13
SLIDE 13

Results - Traffic analysis

  • Traffic capture:

○ McAfee, Symantec and Trend Micro ○ Later Kaspersky

  • In general:

○ Installation, registration, updating ○ Analytical data ○ Lots of hashes and encoded data ○ Only HTTP(S)

13/23

slide-14
SLIDE 14

Results - Traffic analysis

  • Noteworthy:

○ Trend Micro: missing SNI, long plain HTTP GET ○ McAfee: every file gets hashed, google analytics ○ Symantec: ping submission with data buffer ○ Kaspersky: lot of HTTP(S) 400 and 502 errors, certificate pinning

  • No sample submission

14/23

slide-15
SLIDE 15

Results - Traffic analysis

15/23

Das Malwerk Deloitte obfuscated Deloitte direct exports 1e84- ff45 1f7b- 55c7 230a- 6f87 266a- 11f5 2578- 6c51

  • bf.

exe

  • bf. dll

1

  • bf. dll

2 beacon exe beacon dll msf vnm McAfee

✔ ✔ ✔ ✔ ✔

Symantec

✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Trend Micro

✖ ✔ ✔ ✔ ✔ ✔ ✔

Kaspersky

✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

slide-16
SLIDE 16

Results - Sample submission preven3on

  • Offline: undesirable

○ Difference Trend Micro ○ Warning Symantec

  • Blacklisting

○ Unsure what to block ○ Updates can change endpoints

  • Whitelisting

○ Robust ○ Parameters: ■ hostnames ■ traffic size and direction ■ content

16/23

slide-17
SLIDE 17

Results - User emulation

  • Two ways:

○ pywinauto, accessibility API ○ pyautogui, mouse and keyboard, screenshots

  • Compared manual to emulation

○ Malware infection Tree ○ File handles, process tree structure

17/23

slide-18
SLIDE 18

Results - User emulation

18/23

slide-19
SLIDE 19

Results - User emula-on

19/23

slide-20
SLIDE 20

Discussion

  • Contamination of packet captures
  • mitmproxy

○ Insecure connections ○ Kaspersky errors

  • Results of sample submission prevention

○ Unable to trigger sample submission ○ Flaw in research design ○ Based on what we did observe

  • McAfee low detection rate

20/23

slide-21
SLIDE 21
  • Variety of traffic

○ But no sample submission

  • Whitelisting the best approach
  • Dynamic analysis is of added value

○ User emulation matches manual ○ Multiple approaches to emulation

21/23

How can malware be tested for detection

  • f antivirus software

by emulating user actions, without the AV vendor learning about the malware?

Conclusion

slide-22
SLIDE 22

Future work

  • Exploratory investigation in traffic generated by AV software

○ Another approach: reverse engineering

  • Combine whitelisting with IRMA
  • Monitoring AV detection of malware

22/23

slide-23
SLIDE 23

23/23

Questions?