Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips



Similar documents
CIT 480: Securing Computer Systems. Malware

Self Protection Techniques in Malware

File Disinfection Framework (FDF) Striking back at polymorphic viruses

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

Storm Worm & Botnet Analysis

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)

Computer Virus Strategies and Detection Methods

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

ZeroAccess. James Wyke. SophosLabs UK

Attacking Obfuscated Code with IDA Pro. Chris Eagle

Full Potential of Dynamic Binary Translation for AV Emulation Engine

LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade

Anti-Virus Evasion Techniques and Countermeasures

Sandy. The Malicious Exploit Analysis. Static Analysis and Dynamic exploit analysis. Garage4Hackers

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Shellshock. Oz Elisyan & Maxim Zavodchik

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Computer Security DD2395

TitanMist: Your First Step to Reversing Nirvana TitanMist. mist.reversinglabs.com

Botnets Die Hard Owned and Operated

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

CS549: Cryptography and Network Security

CORPORATE AV / EPP COMPARATIVE ANALYSIS

Bypassing Memory Protections: The Future of Exploitation

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Virus Infected Files A TRIZ based analysis

This report is a detailed analysis of the dropper and the payload of the HIMAN malware.

Inside the Storm: Protocols and Encryption of the Storm Botnet

Fine-grained covert debugging using hypervisors and analysis via visualization

Obfuscation: know your enemy

Hypervisor-Based, Hardware-Assisted System Monitoring

Fighting Advanced Threats

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Robust Static Analysis of Portable Executable Malware

for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory

Cloud Services Prevent Zero-day and Targeted Attacks

Code Obfuscation Literature Survey

Operation Liberpy : Keyloggers and information theft in Latin America

By:XÇzA A TÅÅtÜ ]A `t{åééw

AS RECENTLY AS SIX YEARS AGO, COMPUTER

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Software Reversing Engineering (a.k.a. Reversing) Spiros Mancoridis. What is Reverse Engineering? Software Reverse Engineering: Reversing

x86 ISA Modifications to support Virtual Machines

Reversing Android Malware

Data Hiding Techniques

The Value of Physical Memory for Incident Response

Introduction to Reverse Engineering

Bypassing Anti- Virus Scanners

Hide and seek - how targeted attacks hide behind clean applications Szappanos Gábor

Anti-virus Evasion Techniques. By: Abhinav Singh a.k.a DaRkLoRd

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

This is DEEPerent: Tracking App behaviors with (Nothing changed) phone for Evasive android malware

The Symantec Enterprise Papers Volume XXX. Understanding and Managing Polymorphic Viruses.

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Detecting the One Percent: Advanced Targeted Malware Detection

Malware Trend Report, Q April May June

Best Practices for Deploying Behavior Monitoring and Device Control

End-user Security Analytics Strengthens Protection with ArcSight

Windows Operating Systems. Basic Security

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Networks and Security Lab. Network Forensics

UNMASKCONTENT: THE CASE STUDY

CopyKittens Attack Group

egambit Forensic egambit, your defensive cyber-weapon system. You have the players. We have the game.

Adi Hayon Tomer Teller

The Underground Economy of the Pay-Per-Install (PPI) Business

Anti-virus for Microsoft Exchange Server

DESIGN OF GENERIC ANTIVIRUS SYSTEM

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

CS 356 Lecture 9 Malicious Code. Spring 2013

Multifaceted Approach to Understanding the Botnet Phenomenon

TREND MICROTM ServerProtectTM for EMC Celerra TM

Malware. CS 161: Computer Security Prof. Vern Paxson. TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin

LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic

Penetration Test Methodology on Information-Security Product Utilizing the Virtualization Technology

CSE509 System Security

SPAM FILTER Service Data Sheet

Detecting peer-to-peer botnets

Dynamic analysis of malicious code

Static Analysis of Virtualization- Obfuscated Binaries

İSTANBUL AYDIN UNIVERSITY

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Selected Windows XP Troubleshooting Guide

Transcription:

Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips

Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc analysis Future trends

Overview Reported parasitic viruses ITW (2003-2010) Reported number of infections (2003-2010)

Traditional anti-virus defense strategy Detection methods: X-Ray, Behavioral analysis, Heuristic-based scanning, Wildcards + pattern matching. Main disinfection components: The place of the malicious code, The decryption keys places, The decryption algorithm, The place of the original code, The original entry point. Simple detection algorithm: Check for presence of malicious properties, Identify the entry point and locate virus decryptor, Apply generic decryption and heuristic templates, "See through" the encryption by emulating the code, Identify virus body code sequences and detect parasitic code.

W32/Xpaj analysis Code integration, Anti-heuristics tricks, Virtual Machine, File infection and Payload.

W32/Xpaj challenges The ability to recognize virus decryptor, which is randomly spread in the original code, The ability to recognize malicious code which does not modify the properties of the infected program.

Code Integration Overwritten subroutine Original File Infected File Virus Code Redirection to virus decryptor

Code Integration Original File Infected File Subroutine A Subroutine B Subroutine C Call Subroutine B Original code Virus code Virus body Overwritten instructions, VM byte code Legend VM handlers Subroutine B VM dispatcher Hijacked call Encrypted Virus Body Stolen Bytes VM Byte Code

Anti-heuristics tricks Suspicious characteristics / marks of infection: - Suspicious section characteristics and alignment, - Incorrect virtual size in PE header, - Code execution starts in the last section, - Abnormal cavities between section boundaries, - Possible "gap" between sections, - Suspicious code redirection (cross-section jumps), - Unusual imports.

Virtual Machine Main functions: 1) Implements virus decryptor, 2) Decrypts the virus body, 3) Complicates the static analysis of the virus decryptor 4) Conceals VM performance implications.

Virus Decryptor 1) Spread across the code section, 2) Implemented in a stack based VM, 3) Converted to a byte code, 4) Interpreted by the VM dispatcher.

Virtual Machine handlers W32/Xpaj VM Handlers (each VM handler executes a small code stub to compute the right value depending on the current operation type).

Software Protection Trends Encryption Polymorphism/Metamorphism Packers Obfuscators Anti-debugging tricks Anti-emulation tricks

Enter the Virtual Machine Represent a significantly harder software protection that proves extremely resilient to reverse engineering. Driven by the commercial software protection industry. VMProtect ASProtect SVKP Themida Code Virtualizer Starforce Vary from the simple (older VMProtect) to the complex (Themida).

Virtual Machine - Overview Fetch-Decode-Execute responsible for retrieving and executing a virtual instruction. Context represents the internal state of the virtual machine Handlers native machine code responsible for carrying out the logic of each virtual instruction. Bytecode the instructions that the virtual machine will interpret.

Fetch - Decode - Execute

VMProtect Opcode Handlers

Virtual Machine Based Obfuscation Randomly generated opcodes Junk opcodes Multiple opcodes to perform the same action Obfuscated handlers Encrypted bytecode Obfuscated fetch-decode-execute loop Obfuscation applied to bytecode itself Multiple Virtual Machine instances Multiple Virtual Machine architectures (RISC, CISC, etc)

Virtual Machine Analysis Techniques By hand Locate bytecode, context, handlers What is the architecture of the VM Blackbox analysis easily identify overall behavior of the sample Custom disassembler when possible, greatly simplifies understanding the the VM Deobfuscation of the implementation and handlers Tool assisted deobfuscation (Metasm) Apply deobfuscation or decryption to handlers Generate equivalent native code Rewrite the binary, replacing the VM with native code

File infection and Payload Infects Win32 PE files (exe, dll, sys, scr, etc.), Downloads position independent code (plugins), Increases the virtual size of the section containing the virus body by 150KB, Accepts only digitally signed payloads and commands, Uses sophisticated domain-generation algorithm to create and query the list of random domains, Sends information from the infected system to C&C server (OS version, Service Pack, IP, etc.)

W32/Winemmem analysis Package Infection and Integrity Check Bypass, EP hijacking, System DLLs infection, On-the-fly physical file modifications.

W32/Winemmem device driver No modifications to system kernel structures, Bypassing shared violation error for running processes, MmFlushImageSection() - destroys the image section and returns any used pages to the free list.

W32/Induc The virus copies following malicious code into SysConst.pas file, part of Delphi installation, Renames the existing SysConst.dcu to SysConst.bak, A new SysConst.dcu file is created by compiling the malicious SysConst.pas, The original SysConst.pas file is then deleted. Any file that is subsequently compiled with Delphi will have the viral code included in it::

Future trends Monetary gain, Viruses are not loud, ubiquitous and destructive anymore, Bots harvesting, Intense use of polymorphic techniques aimed at circumventing the current AV scanners, VM based obfuscators avoid detection and increase the effort needed to analyze the malware sample.