Manual Malware Analysis Using Static Method

This research is to identify which malware may bypass or refuse to run in a virtual technology environment like VMware. Commonly, malware writers include the list of instructions such as memory instruction artifact (sldt) to employ antiVME technique. From extensive testing, the result shows Virus and Worms malware types contain the potential malware instruction. In future, we plan to using dynamic or behavior malware analysis and automated analysis that involves more samples malware used simultaneously and give more consistent and accurate result.

pdf5 trang | Chia sẻ: huongthu9 | Lượt xem: 456 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Manual Malware Analysis Using Static Method, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
N C S C International Journal of Computer Networks and Communications Security VOL.1, NO.7, DECEMBER 2013, 324–328 Available online at: www.ijcncs.org ISSN 2308-9830 Manual Malware Analysis Using Static Method NORKHUSHAINI AWANG1, ARIFIN SALLEH2 and MOHAMAD YUSOF DARUS3 1, 2, 3 Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, 40450 Malaysia. E-mail: 1shaini@tmsk.uitm.edu.my, 2arifin@ump.edu.my, 3yusof@tmsk.uitm.edu.my ABSTRACT Today malware threats represent the greatest challenge to information security. Combat between malware writer and malware researcher never end. Malware writers use a variety of avoidance techniques such as Code Obfuscation, Packing, Anti-Debugging and Anti-Virtualisation Technologies to foil researcher’s analysis. On behalf of researchers they try to find out many techniques to defend Information Technology (IT) services from access or stolen by unauthorized parties. Most of the researches perform malware analysis in Virtualisation Technology in the isolation environment because of security issues. This research focuses on analysis malware using static method in operating system environment. Thus, we focus on malware analysis that uses Anti-Virtualisation avoidance technique. Although our platform environment exposed to the threat by malware sample, we protect this environment by using Toolwiz TimeFreeze and window backup image to protect and secure our environment. This research proved that our environment capable to do malware analysis and compare our environment with the virtual machine environment to prove that our analysis more accurate. Keywords: Malware, Security, Threats, Static Analysis, Dynamic Analysis, Operating System. 1 INTRODUCTION Now day malware threats were assessed by IT security organizations has been growing more than ten thousand every day. Symantec Internet Security Threat Report (2011) reveals that the total number unique variants of malware in the world in 2011 around 403 million compared to 286 million variants in 2010. By using many avoidance techniques such as self-defending code, packing, anti-debugging and anti-Virtualization techniques has a leading a problems on computer network especially cause of bottlenecks in the network and increased threat of criminal for corporate and individual data. The most challenging for antivirus organization and researcher is about the threat that occurs in computer applications because of the unknown vulnerability or known as a zero-day attack. This attack will take advantage of an application that has issue of security vulnerability. Thus, this research endeavours to discover the best solution by conducting malware analysis. The malware analysis can conduct in many environments or platform such as using the virtual machine environment such as Virtual PC, VMware and QEMU. The online analysis tools like Sandbox or use traditional way with using real machine environment in a secure environment. Choose the right malware analysis environment is very import to make sure the result from analysis can get the accuracy of information about the malware threat. 2 RELATED WORKS Basically there are two techniques that used to conduct malware analysis, Static or code analysis and dynamic or behavior analysis. But Zeltser [1] divided to three techniques such as above and another one is about memory analysis. This analysis will extract artifacts that related to malware program by examining memory. The malware such as Rootkits trying to hide it during malware analysis can identify by using this analysis. Other advantages of this analysis, it can save time and get results immediately when studying the sample of malware in dynamic or static analysis. Malware analysis environments are most impor- tant part of malware analysis to get the accurate result of analysis especially to get the correction about the malware behavioral information. But most 325 N. Awang et al. / International Journal of Computer Networks and Communications Security, 1 (7), December 2013 of researchers today preferred to use Virtualization software such as virtual machine to conduct malware analysis [2]. In order to minimize the potential damage of the analysis environment Virtualization technology is very useful for creating control environment [3]. Thus this environment can reduce the costing compared to using real machine. Malware writers use a variety of avoidance techniques to foil researchers during the analysis the malware especially when doing reverse engineering analysis and forensic analysis. Basically, there are four common avoidances or anti-analysis techniques such as Anti-Virtualization, Packing, Code Obfusca- tion and Anti-Debugging Techniques [3, 4, 5, 6]. In year 2011, in research [7] try to prove that top 10 malware list given by Microsoft that this malware not aware about the virtual environment during malware analysis. The reason because of the most of current infrastructure now a day like server moving towards Virtualization today and not only use by researchers tools. But in 2012, Black Hat USA [5], published the first result of a security research project calls Dissect || PE that different point of view about the technique of malware that bypass Virtualization technology. 3 TESTING AND ANALYSIS In this research, we focused on analysis malware using static and in operating system environment. Figure 1 shows the process during conduct malware analysis in the operating system environment for static analysis. In the first stage, we must provide a secure environment with open the Toolwiz TimeFreeze tools. Then, run or open IDA Pro to analysis malware code. The python script is use to find out the instruction that the malware bypass Virtualization technology. Lastly, we record the analysis finding and stop Time Freeze and reboot the PC. Table 1 shows the malware sample base on categories of malware. In this research, 20 samples of malware from different categories are chosen and analyzed in IDA Pro tools. The purpose of this analysis is to identify which malware may bypass or refuse to run in a virtual technology environment like VMware. Fig. 1. The Process Implementing Setup OS Environment for Static Analysis. Table 1: Malware Sample 326 N. Awang et al. / International Journal of Computer Networks and Communications Security, 1 (7), December 2013 Figure 2 shows about the process of analysis results in order to generate the output along with the conclusion that came out from all the findings. The result will be compared by generating the report in table and graph forms. Table 2 shows the summary of the static analysis result from the type of malware which are Virus and Trojan and Table 3 for Worms and Bots. By using IDA Pro and python script, it is found that three of five malware samples have contained potential anti-VME instructions for the Virus. Instead, none of the instruction was found from Trojan. The sample type of Virus such as Virus.Win32.Virut.av, Win32.Hawey.A and W32.Virut.3 found the anti-VME instruction in memory instruction artifact (sldt) and VME Communicational Channel by using port “IN”. Research in [5], notice that 99.45 % of the VME detective is coming from the “IN” port Fig. 2. The Process of Analysis Results Table 2: The Static Analysis Result (Virus and Trojan) Types of Malware File Name Results Virus Virus.Win32.Viru t.av One Potential Anti-VME instruction "Sldt" found at 0042303B location. May file was packed or modified due to make it more difficult to analyze. Take time to load. Virus.Win32.Tex el.A No Instructions of Anti- VME found Take time to load. Win32.Hawey.A One Potential Anti-VME instruction "Sldt" found 00404467 locations W32.Virut.3 . Five Potential Anti-VM instructions; 'Sldt" instruction found at 00403288 locations, "In" instruction found at 0040338C, 004033CB, 004033D2 and 00403407 Virus.Win32.Enerlam.c No Instructions of Anti- VM found Trojan Trojan- Dropper.Agent!I K No Instructions of Anti- VM found W32Autorun.KA No Instructions of Anti- VM found Win32Malware- gen No Instructions of Anti- VM found Trojan.Genome.nj ip No Instructions of Anti- VM found W32Trojan2.JRC A No Instructions of Anti- VM found 327 N. Awang et al. / International Journal of Computer Networks and Communications Security, 1 (7), December 2013 Table 3: The Static Analysis Result (Worms and Bots) The static analysis is figuring out in the graph as shown in Figure 5. The result shows Virus and Worms malware types contain the potential malware instruction. From 20 samples of malware, it is found that 35% of malware are having potential anti-VME instruction. 20% comes from Worms, 15% from Virus and none from Trojans and Bots. This result is expected because of the Trojans and Bots are performing as a network malware while the Virus and Worms are the computer malware which are targeted on the computer system. Fig. 2. The Static Malware Analysis 4 CONCLUSION This research is to identify which malware may bypass or refuse to run in a virtual technology environment like VMware. Commonly, malware writers include the list of instructions such as memory instruction artifact (sldt) to employ anti- VME technique. From extensive testing, the result shows Virus and Worms malware types contain the potential malware instruction. In future, we plan to using dynamic or behavior malware analysis and automated analysis that involves more samples malware used simultaneously and give more consistent and accurate result. 5 REFERENCES [1] L. Zeltser. (2010,Oct 9), “Phases-Malware- Analysis-Behavioral-Code-Memory-Forensics” Available: forensics.sans.org/blog/2010/10/11/3-phases- malware-analysis-behavioral-code-memory- forensics. [2] L. Sun et al., “An automatic Anti-VMware Technique Application for Multi-stage Packed Malware”, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), Fairfax, Oct 7-8, 2008, pp. 17- 23. [3] M. Fadli and A. Jantan, ”Secure Environment Platform for Host-based Dynamic Analysis using DeepFreeze”, International Conference on Computer Application and Education Technology (CCAET2011), Beijing, China, December 3-4, pp. 164-167. Types of Malware File Name Results Worms W32Conficker !Generic Two Potential Anti-VM instructions; "In" instruction found at 100073F5 and 10007CD1. May file was packed or modified due to make it more difficult to analyze. Worm.Virut.G en.D-175 Four Potential Anti-VM instructions; "In" instruction found at 0044E0AB, 0044E0B0, 0044E101 and 0044E12B May file was packed or modified due to make it more difficult to analyze. W32Conficker One Potential Anti-VM instructions; "Sldt" instruction found at 0026766B Worm_win32_ autorun_pga No Instruction of Anti-VM found May file was packed or modified due to make it more difficult to analyze Worm.Blaster. A One Potential Anti-VM instructions; "Sidt" instruction found at 004060A5. May file was packed or modified due to make it more difficult to analyze. Bots Backdoor_32_ sdbot_fmf No Instruction of Anti-VM found Gbot.2764 No Instruction of Anti-VM found PHPPbot.A No Instruction of Anti-VM found Sniper Bots Makerv2.exe No Instruction of Anti-VM found W32MalwareF .BOTS No Instruction of Anti-VM found 328 N. Awang et al. / International Journal of Computer Networks and Communications Security, 1 (7), December 2013 [4] W. Gharibi and A. Mirza, “Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies“, IJCSI International Journal of Computer Science Issues, Vol.8.Issue 1, January 2011. [5] R. Rubigo et al. (2010 July 30), “Scientific but Not Academical Overview of Malware Anti- Debugging, Anti-Disassembly and Anti-VM Technologies”, [online]. Available: Http:// paper.pdf [6] M. Michael and A. Honig, ” Practical Malware Analysis ”,William Pollock,38 Ringold Street, San Francisco, 2012. [7] A.Mushtaq (2011,Jan,27),” The Dead giveways of VM-aware Malware” [online]. Available: dead-giveaways-of-vm-aware-malware.html

Các file đính kèm theo tài liệu này:

  • pdfmanual_malware_analysis_using_static_method.pdf