Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security Researcher @memfors4all #RSAC

Similar documents
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan

Memory Forensics & Security Analytics: Detecting Unknown Malware

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Digital Forensic analysis of malware infected machine Case study ***

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Security Intelligence Services.

NTT R&D s anti-malware technologies

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

Evolving Threat Landscape

HP NonStop Server Security and HP ArcSight SIEM

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Secure Your Mobile Workplace

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cisco Advanced Malware Protection for Endpoints

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Find the needle in the security haystack

All Information is derived from Mandiant consulting in a non-classified environment.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

High End Information Security Services

IT Security Strategy and Priorities. Stefan Lager CTO Services

Modern Approach to Incident Response: Automated Response Architecture

Practical Threat Intelligence. with Bromium LAVA

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

The Value of Physical Memory for Incident Response

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

New Zealand National Cyber Security Centre

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Security Intelligence Services. Cybersecurity training.

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

The Role of Security Monitoring & SIEM in Risk Management

Rashmi Knowles Chief Security Architect EMEA

Unified Security Management and Open Threat Exchange

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Persistence Mechanisms as Indicators of Compromise

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

CHAD TILBURY.

Critical Security Controls

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Concierge SIEM Reporting Overview

Splunk: Using Big Data for Cybersecurity

Unprecedented Malware Growth

The Cloud App Visibility Blindspot

Bridging the gap between COTS tool alerting and raw data analysis

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Security Services. 30 years of experience in IT business

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Unified Security, ATP and more

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

The SIEM Evaluator s Guide

Integrating MSS, SEP and NGFW to catch targeted APTs

Automate your IT Security Services

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

McAfee Network Security Platform

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Speed Up Incident Response with Actionable Forensic Analytics

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

IBM Advanced Threat Protection Solution

Cisco Advanced Malware Protection for Endpoints

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Cisco Advanced Malware Protection

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Eight Essential Elements for Effective Threat Intelligence Management May 2015

OWASP Logging Project - Roadmap

Advanced Endpoint Protection

How To Integrate Intelligence Based Security Into Your Organisation

TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014

Symantec Endpoint Security Management Solutions Presentation and Demo for:

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Nessus and Antivirus. January 31, 2014 (Revision 4)

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Deep Security Vulnerability Protection Summary

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

EnCase Analytics Product Overview

End-user Security Analytics Strengthens Protection with ArcSight

Cyber Security Metrics Dashboards & Analytics

Transcription:

SESSION ID: ANF-T09 Detecting Unknown Malware: Security Analytics & Memory Forensics Fahad Ehsan Cyber Security Researcher @memfors4all

Where it all Started ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,44324 Beware of this VIRUS...Contact us for vaccination... $#@% ------------------------------------------------------------------------------------------- http://campaigns.f-secure.com/brain/virus.html

Bolware.. Boleto Fraud $3.75 Billion Country : Brazil (since 2013) Total Victims: 192,227 (unique IPs) Browsers : IE, Firefox, Chrome Method : - Create Dummy Exe (AvastSvc.exe) - Code Injection into a legit Process - Wait for Browser Launch - Launch Injected code - Create hooks in system APIs - Create a copy and Add Registry Key MItB RegKey: HKCU\Software\Microsoft\Windows\CurrentV ersion\run\76e35fb1 http://www.emc.com/collateral/whitepapers/h13282-report-rsa-discovers-boletofraud-ring.pdf

Regin : Super Spyware Nov 2014 Cyber-espionage tool developed by a nation state. Affects GSM and all major OS. Regin takes its name from IN REGistry Recently detected by Symantec, Kaspersky -Active since 2008 Modular Domino Affect Thought to be as complex as Stuxnet Targets found across the world, 14 countries and still counting https://securelist.com/files/2014/11/kaspersky_lab_whitepaper_regin_platform_eng.pdf

2014 : Major Incidents

Agenda Unknown Malware Memory Forensics IOCs and Threat Intelligence Security Analytics My Solution Q & A

What is Unknown Malware All Malware is Unknown at some point in its life. Rule and Signature based tools often fail to detect Unknown malware. Any malware that is not detected by traditional and modern security tools at any given time. The bottle neck is generally the time taken by the vendors to update the signatures and contents. Unknown Malware can target a specific environment, which makes it even more difficult to detect e.g. stuxnet Unknown Malware generally target Zero-Vulnerabilities, as there is little protection available against such vulnerabilities.

Common Enterprise Security Tools Most of the tools found in enterprise today are signature or rule based. Host based Anti- Malware HIDS/HIPS Signature Based Policy and Heuristics Based Limited Customization Customizable DLP Policy based Customizable Firewall Rule Based Customizable Network based NIPS/NIDS Signature Based Customizable Sandboxing Tools Signature and Heuristics Based Limited Customization Proxy Content Filtering Signature Based Customizable Gateway - Anti-Spam & Malware Signature Based Customizable

Latest Host Based Tool : On-Host Forensics Anti-Malware Signature Based Limited Customization Host based tools HIDS/HIPS Policy and Heuristics Based Customizable DLP Policy based Customizable On-Host Forensics Mandiant Redline Carbon Black Encase ediscovery Heuristics and IOC based Customizable

Memory Forensics Forensic Analysis of the Memory dump taken from an infected computer. Traditionally, this is done manually with the help of tools. Memory dump taken from a live system Identify artifacts in memory which can be malicious or stealthy Techniques In enterprises, generally used for Incident Response The findings can be helpful for future investigations Build internal repository of known malware and build defenses against them

How Memory Forensic Tools work In most cases, a successful malware infection leaves a trail of evidence and symptoms in the memory Audits and collects running processes, drivers from memory, registry data, tasks, network connections etc Analyze data, which is collected from the Memory, this maybe based on heuristics or other techniques Perform Indicator of Compromise (IOC) analysis. It is any artifact residing in the memory or on the system, e.g. Registry Key, File Hash, Connection, Process, Files Source : SANS Website

Threat Intelligence It is a source of information which provides early warnings on emerging threats applicable to your environment. TI can be gathered from multiple sources Cyber Security Communities e.g. CERTs, Cyber Security Forums, OpenIOC, Cybox Government briefings e.g. US- CERT, FBI Open Forums e.g. facebook, IRC channels, Websites In-House/Vendor Research E.g. Verizon, McAfee etc Closed Source Peer Discussions Government Briefings Closed Source Peer Discussions Cyber Security Communities Threat Intelligence In-House / Vendor Research Open Forums

Using Memory Forensics with Security Analytics The Security Analytics solution brings information together from multiple sources to detect Malware. Honeypots Memory Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook ref Security Analytics Solution SIEM IDS, Antivirus, Syslogs, Proxy, etc

Detecting Known Malware Both IOCs and Signatures have similar limitations, both require somebody to report. You need something smarter. IOCs Signatures Open Format Low turnaround time Can be incomplete / experimental May requires internal research Can be customized Somebody needs to report Vendor Specific Depends on the Vendor Independently validated by Vendor Environment independent Limited Customization Somebody needs to report

Detecting Known Malware : ZEUS If any of the criteria in the IOC is met, the host is likely to be infected with Zeus. IOCs via Threat Intelligence Feed Security Analytics Solution Get Memory Analysis data Memory Analysis Data Process List ZEUS Registrykey:Microsoft\Windows NT\CurentVersion\Winlogon RegistryValue:C:/WINDOWS/system32/sdra64.exe. AND RegistryKey: ControlSet001\Services\SharedAces\Parameters\Firew alpolicy\standardprofile RegistryValue:0 AND IP:193.104.41.75 Report and Raise Alerts Correlate results with other sources Map Against IOCs Gather Results Registry Keys Connections List Loaded Dlls Environment variables File Handles

Understand your Environment One of the ways to detect Unknown Malware is by baselining your environment Compare your current environment with a known old state. Statistical analysis of your environment Baseline your Environment Use Security Analytics Solution to do massive historical analysis Identify anomalies in your environment Feedback the findings in to new Baseline Collect Data Build strong research and incident response capabilities to detect and respond to Unknown Malware Look for anomalies and investigate Compare against Baseline

Detecting Unknown Malware Security Analytics can be used to detect anomalies by doing comparisons against last known baseline. Latest known Baseline Security Analytics Solution Get Memory Analysis data Memory Analysis Data Known Process Registry Keys Whitelisted Connections Report and Raise Alerts Compare Against Baseline Process List Registry Keys Connections List Loaded Dlls Drivers, Dlls File Hashes Software installs Detect anomalies using mathematical models, trending etc Gather Results Environment variables File Handles

The Solution Based on an Open source Toolkit and relatively cheap solutions Volatility is a well known open source memory Analysis tool Has built in Malware detection capabilities Supports Windows, Linux, Android, Mac OS etc Can help in capturing Indicators of compromise (IOC) by listing memory contents as text or dumping files Items like processes, connections, registry keys etc can be dumped to disk

The Solution Step 1 Dump memory to a Secure Drive. The Secure Drive is Hidden from the user. RAM Step 2 Run Volatility to extract contents of the memory Processes Registry Keys Connections Drivers IE History

The Solution Step 3 Send data to a central server every 30 mins Windows Server Clients Windows 7 Clients DB and Analytics Server Windows XP Clients

Lab Setup A Windows XP Client 1 GB RAM Running Volatility Windows 7 Running SQL Server This is our POC Security Analytics Engine Sample IOCs loaded in the Security Analytics solution The server receives memory analysis data from the Client and processes it

The Demo Detect known malware using IOC Detecting Unknown Malware

Pros and Cons Benefits Cost Provides vital information from clients which may not be available from any other source e.g. registry key, active processes Open source tool, which is flexible. The scripts can be changed to suit the environment and scale in the future. Can be integrated with external Intelligence feeds to detect emerging threats Concerns Can be resource intensive, consumes CPU during advanced analysis Based on open source tools with limited support Data Privacy

So where do we go from here We learned today that a Memory Forensics tool can be developed using open source software You can start small and scale as you learn more about your own environment You don t need deploy a fancy Analytics solution to get started with finding Unknown Malware

The Big Picture Memory Forensics is a growing field and it will play a vital role as Security Analytics Solutions mature. Honeypots Memory Analysis Data Packet Capture Other Security Feeds Threat Intelligence IOCs, IRC chat, Forums, Facebook Security Analytics Solution SIEM IDS, Antivirus, Asset Inventory, Syslogs, Proxy, etc

Credits Lenny Zeltser @lennyzeltser http://zeltser.com/ Jamie Levy Volatility project http://gleeda.blogspot.se/ Malware Analyst's Cookbook by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard The Art of Memory Forensics by Michael Ligh, Andrew Case, Jamie Levy, AAron Walters

Thank You Questions? Fahad Ehsan CyberSecurity Researcher fahade@gmail.com Twitter : @memfors4all GitHub Location: https://github.com/memforsking/memfors4all