Memory Forensics & Security Analytics: Detecting Unknown Malware



Similar documents
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan

Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Digital Forensic analysis of malware infected machine Case study ***

HP NonStop Server Security and HP ArcSight SIEM

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

NTT R&D s anti-malware technologies

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

All Information is derived from Mandiant consulting in a non-classified environment.

Cisco Advanced Malware Protection for Endpoints

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

IT Security Strategy and Priorities. Stefan Lager CTO Services

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Evolving Threat Landscape

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Practical Threat Intelligence. with Bromium LAVA

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

New Zealand National Cyber Security Centre

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Concierge SIEM Reporting Overview

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Modern Approach to Incident Response: Automated Response Architecture

Secure Your Mobile Workplace

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Defending Against Data Beaches: Internal Controls for Cybersecurity

CHAD TILBURY.

High End Information Security Services

Persistence Mechanisms as Indicators of Compromise

Rashmi Knowles Chief Security Architect EMEA

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

Automate your IT Security Services

Speed Up Incident Response with Actionable Forensic Analytics

The Value of Physical Memory for Incident Response

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Critical Security Controls

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Cisco Advanced Malware Protection

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

How To Integrate Intelligence Based Security Into Your Organisation

Unified Security Management and Open Threat Exchange

The Cloud App Visibility Blindspot

Bridging the gap between COTS tool alerting and raw data analysis

McAfee Network Security Platform

Unprecedented Malware Growth

Security Intelligence Services.

Unified Security, ATP and more

Cisco Advanced Malware Protection for Endpoints

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Security Services. 30 years of experience in IT business

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Critical Controls for Cyber Security.

TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014

OWASP Logging Project - Roadmap

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Find the needle in the security haystack

Splunk: Using Big Data for Cybersecurity

Active Response: Automated Risk Reduction or Manual Action?

Using SIEM for Real- Time Threat Detection

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Advanced Endpoint Protection

Deep Discovery. Technical details

A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Redline Users Guide. Version 1.12

Security Controls Implementation Plan

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Advanced Threats: The New World Order

IBM Advanced Threat Protection Solution

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

INFORMATION SECURITY TRAINING CATALOG (2015)

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH

Protecting Your Organisation from Targeted Cyber Intrusion

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Quick Heal Exchange Protection 4.0

Data Science Transforming Security Operations

FORBIDDEN - Ethical Hacking Workshop Duration

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Endpoint Threat Detection without the Pain

Transcription:

Memory Forensics & Security Analytics: Detecting Unknown Malware SESSION ID: SEC-T09 Fahad Ehsan Associate Director Security Research and Analytics UBS AG

Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,44324 Beware of this VIRUS...Contact us for vaccination... $#@% ------------------------------------------------------------------------------------------- 2

Bolware.. Boleto Fraud $3.75 Billion Country : Brazil (since 2012) Total Victims: 192,227 Browsers : IE, Firefox, Chrome Method : - Create Dummy Exe (AvastSvc.exe) - Code Injection into a legit Process - Wait for Browser Launch - Launch Injected code - Create hooks in system APIs - Create a copy and Registry Entry MItD RegKey: HKCU\Software\Microsoft\Windows\CurrentV ersion\run\76e35fb1 https://blogs.rsa.com/wp-content/uploads/2015/07/bolware-fraud-ring- RSA-Research-July-2-FINALr2.pdf 3

Agenda Unknown Malware Memory Forensics IOCs and Threat Intelligence Security Analytics My Solution Q & A 4

What is Unknown Malware All Malware is Unknown at some point in its life. Rule and Signature based tools often fail to detect Unknown malware. Any malware that is not detected by traditional and modern security tools at any given time. The bottle neck is generally the time taken by the vendors to update the signatures and contents. Unknown Malware can target a specific environment, which makes it even more difficult to detect e.g. stuxnet Unknown Malware generally target Zero-Vulnerabilities, as there is little protection available against such vulnerabilities. 5

Common Enterprise Security Tools Most of the tools found in enterprise today are signature or rule based. Host based Anti- Malware HIDS/HIPS Signature Based Policy and Heuristics Based Limited Customization Customizable DLP Policy based Customizable Firewall Rule Based Customizable Network based NIPS/NIDS Signature Based Customizable Sandboxing Tools Signature and Heuristics Based Limited Customization Proxy Content Filtering Signature Based Customizable Gateway - Anti-Spam & Malware Signature Based Customizable 6

Latest Host Based Tool : On-Host Forensics Anti-Malware Signature Based Limited Customization Host based tools HIDS/HIPS Policy and Heuristics Based Customizable DLP Policy based Customizable On-Host Forensics Heuristics and IOC based Customizable Mandiant Redline Carbon Black Encase ediscovery 7

Memory Forensics Forensic Analysis of the Memory dump taken from an infected computer. Traditionally, this is done manually with the help of tools. Memory dump taken from a live system Identify artifacts in memory which can be malicious or stealthy Techniques In enterprises, generally used for Incident Response The findings can be helpful for future investigations Build internal repository of known malware and build defenses against them 8

How Memory Forensic Tools work In most cases, a successful malware infection leaves a trail of evidence and symptoms in the memory Audits and collects running processes, drivers from memory, registry data, tasks, network connections etc Analyze data, which is collected from the Memory, this maybe based on heuristics or other techniques Perform Indicator of Compromise (IOC) analysis. It is any artifact residing in the memory or on the system, e.g. Registry Key, File Hash, Connection, Process, Files Source : SANS Website 9

Threat Intelligence It is a source of information which provides early warnings on emerging threats applicable to your environment. TI can be gathered from multiple sources Cyber Security Communities e.g. CERTs, Cyber Security Forums, OpenIOC, Cybox Government briefings e.g. US- CERT, FBI Open Forums e.g. facebook, IRC channels, Websites In-House/Vendor Research E.g. Verizon, McAfee etc Closed Source Peer Discussions Government Briefings Closed Source Peer Discussions Cyber Security Communities Threat Intelligence In-House / Vendor Research Open Forums 10

Using Memory forensics with Security Analytics The Security Analytics solution bring information together from multiple sources to detect Unknown Malware. Honeypots Memory Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook ref Security Analytics Solution SIEM IDS, Antivirus, Syslogs, Proxy, etc 11

Detecting Known Malware Both IOCs and Signatures have similar limitations, both require somebody to report. You need something smarter. IOCs Signatures Open Format Low turnaround time Can be incomplete / experimental May requires internal research Can be customized Somebody needs to report Vendor Specific Depends on the Vendor Independently validated by Vendor Environment independent Limited Customization Somebody needs to report 12

Detecting Known Malware : ZEUS If any of the criteria in the IOC is met, the host is likely to be infected with Zeus. ZEUS IOCs via Threat Intelligence Feed Registry key : Microsoft\Windows NT\CurrentVersion\Wi nlogon Registry Value : C:/WINDOWS/system3 2/sdra64.exe. AND Registry Key : ControlSet001\Service s\sharedaccess\param eters\firewallpolicy\st andardprofile Registry Value : 0 AND IP : 193.104.41.75 Security Analytics Solution Report and Raise Alerts Correlate results with other sources Get Memory Analysis data Map Against IOCs Gather Results Memory Analysis Data Process List Registry Keys Connections List Loaded Dlls Environment variables File Handles 13

Understand your Environment One of the ways to detect Unknown Malware is by baselining your environment Compare your current environment with a known old state. Statistical analysis of your environment Use Security Analytics Solution to do massive historical analysis Feedback the findings in to new Baseline Baseline your Environment Collect Data Identify anomalies in your environment Build strong research and incident response capabilities to detect and respond to Unknown Malware Look for anomalies and investigate Compare against Baseline 14

Detecting Unknown Malware Security Analytics can be used to detect anomalies by doing comparisons against last known baseline. Latest known Baseline Security Analytics Solution Get Memory Analysis data Memory Analysis Data Known Process Registry Keys Whitelisted Connections Drivers, Dlls File Hashes Software installs Report and Raise Alerts Detect anomalies using mathematical models, trending etc Compare Against Baseline Gather Results Process List Registry Keys Connections List Loaded Dlls Environment variables File Handles 15

The Solution Based on an Open source Toolkit and relatively cheap solutions Volatility is a well known open source memory Analysis tool Has built in Malware detection capabilities Supports Windows, Linux, Android, Mac OS etc Can help in capturing Indicators of compromise (IOC) by listing memory contents as text or dumping files Items like processes, connections, registry keys etc can be dumped to disk 16

The Solution Step 1 Dump memory to a Secure Drive. The Secure Drive is Hidden from the user. RAM Step 2 Run Volatility to extract contents of the memory Processes Registry Keys Connections Drivers 17 IE History

The Solution Step 3 Send data to a central server every 30 mins Windows Server Clients Windows 7 Clients DB and Analytics Server Windows XP Clients 18

Lab Setup A Windows XP Client 1 GB RAM Running Volatility Windows 7 Running SQL Server This is our POC Security Analytics Engine Sample IOCs loaded in the Security Analytics solution The server receives memory analysis data from the Client and processes it 19

Pros and Cons Benefits Cost Provides vital information from clients which may not be available from any other source e.g. registry key, active processes Open source tool, which is flexible. The scripts can be changed to suit the environment and scale in the future. Can be integrated with external Intelligence feeds to detect emerging threats Concerns Can be resource intensive, consumes CPU during advanced analysis Based on open source tools with limited support 20

So where do we go from here We learned today that a Memory Forensics tool can be developed using open source software We can automate many of the steps involved in Memory Forensics You don t need a fancy Analytics solution to get started with finding Unknown Malware 21

The Big Picture Memory Forensics is a growing field and it will play a vital role as Security Analytics Solutions mature. Honeypots Memory Forensics & Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook ref Security Analytics Solution SIEM IDS, Antivirus, Asset Inventory, Syslogs, Proxy, etc 22

Q & A 23

Thank You