SlideShare a Scribd company logo
1 of 53
Download to read offline
FFRI,Inc. 
PacSec 2014 
TENTACLE: 
Environment-Sensitive Malware Palpation 
FFRI, Inc. 
http://www.ffri.jp 
Ver 2.00.01 
1 
Yosuke Chubachi, Kenji Aiko
FFRI,Inc. 
About us 
2 
Yosuke Chubachi is a security 
engineer at FFRI, Inc. since this spring. 
He studied at the graduate school of 
information system engineering, 
University of Tsukuba. He is a Security 
Camp lecturer and a member of 
executive committee of SECCON since 
2012. 
Kenji Aiko is a programmer at FFRI, 
Inc., and is a one of the developers of 
"FFRI yarai" which is a targeted attack 
protection software. He is a Security 
Camp lecturer and a member of 
executive committee of SECCON since 
2012.
FFRI,Inc. 
Contents 
• Background/Motivation 
• Taxonomy of anti-‐‑‒sandbox techniques 
• Tentacle Design 
• Implementation 
• Experiments 
• Conclusion 
3
FFRI,Inc. 
Background 
• Malware explosion 
– 120,000,000/recent 
year 
• Antivirus is dead…? 
4 
AV Test: Statistics –New Malware- (Nov. 05 2014 viewed) 
http://www.av-test.org/en/statistics/malware/
FFRI,Inc. 
We need dynamic and automated malware analysis 
• “Scalability” is most important factor in 
information explosion era 
– Cloud 
– Bigdata 
– IoT 
• Malware analysis also needs “scalable” 
methodology 
– Automation is justice 
5
FFRI,Inc. 
Obi wan said, “Use the sandbox, Luke” 
• Security engineer and researcher use 
sandbox environment for malware analyzing 
• Automated dynamic analysis technology also 
based on VM/application sandbox 
– Anubis(online sandbox) 
– Cuckoo Sandbox(VirtualBox base) 
– Some commercial UTM Appliance 
– Some commercial endpoint security solution 
6
FFRI,Inc. 
Sophisticated malware strike back 
• Sophisticated malware arms many anti-‐‑‒ 
analyze techniques 
• Naturally using targeted attacks, cyber 
espionage, banking malware 
• We called those malware “evasive malware”  
7
FFRI,Inc. 
Related work 
• BareCloud [Dhilung K et al., USENIX SECʼ’14] 
– “5,835 evasive malware out of 110,005 recent 
samples” 
• Prevalent Characteristics in Modern Malware 
[Gabriel et al., BH USA ʻ‘14] 
– “80% malware detect vmware using backdoor port” 
8 
What do you think?
FFRI,Inc. 
Case study: Citadel 
• Some citadel detects the execution 
environment and do not engage in malicious 
behavior when the current host differs from 
the infected host 
– To avoid dynamic malware detection(like sandbox 
analysis) 
• Showing 2 examples 
– Host-‐‑‒fingerprinting 
– VM/Sandbox detection 
9
FFRI,Inc. 
Host-fingerprinting 
• Embedding infected hostʼ’s unique value into 
execution binary 
10 
Citadel 
Unpacker 
Malicious 
code 
Self-rewriting 
when 
original malware 
execution 
Environment-sensitive 
Citade l 
Unpacker 
Malicious 
code with 
host unique 
value 
Different signature pattern
FFRI,Inc. 
Host-fingerprinting(cont’d) 
• Getting GUID on system drive using the 
GetVolumeNameForVolumeMountPoint() 
• Comparing running hostʼ’s GUID value and embedded 
infected hostʼ’s value 
• Process executes malicious code if GUID values are 
consistent 
11 
Infected host’s GUID(packed) 
Unpacked GUID 
Format: 
{XXXXXXXX-XXXX-XXXX-XXXXXXXX} 
Unpack 
Environment-sensitive 
Citade l 
Unpacker 
Malicious 
code with 
host unique 
value
FFRI,Inc. 
VM/Sandbox detection 
• Checking processʼ’s product name  
– like ”*vmware*”, ”*virtualbox” 
• Scanning specific files and devices 
– C:popupkiller.exe 
– C:stimulator.exe 
– C:TOOLSexecute.exe 
– .NPF_̲NdisWanIp 
– .HGFS 
– .vmci 
– .VBoxGuest  
12
FFRI,Inc. 
Citadel behavior of host/environment inconsistency 
• For example: 
– Process termination 
– Running fake(or harmless) code 
13 
Not really matter 
A serious matter 
Initialization 
(unpack) 
Sandbox(incl. VM) 
Detection 
Malicious 
routine 
Decoy 
routine 
If running 
on an analyzing 
environment
FFRI,Inc. 
Citadel runtime activities 
14 
Initialization 
Scouting 
Malicious 
Behavior 
Memory 
Persistent 
unpack 
storage 
Environment-awareness 
Network 
Host fingerprinting 
Malicious code execution 
Code 
injection 
Connecting 
CC server 
Unauthorized 
Access
FFRI,Inc. 
Aim of evasive malware 
• Signature-‐‑‒based AV detection avoiding 
• Anti-‐‑‒analyzing 
– Anti-‐‑‒security engineer 
– Sandbox evasion 
15
FFRI,Inc. 
Motivation 
• An automatic investigation into a condition 
used by sandbox evasion 
– Faking bare-‐‑‒metal environment on sandboxes  
16 
InitializationSandbox(incl. VM) 
Pass! 
(unpack) 
Detection 
Malicious 
routine 
Transparent Sandbox 
Using Investigated Conditions
FFRI,Inc. 
Know Your Enemy 
TAXONOMY OF ANTI-SANDBOX 
17
FFRI,Inc. 
Taxonomy of anti-sandbox techniques 
• Anti-‐‑‒sandbox maneuver 
– Environment awareness 
• Using result of sandbox detection 
– (Stalling code) 
– (User interaction checks) 
 
• Sandbox (debug/sandbox/vm) detection 
– Artifact fingerprinting 
– Execution environment fingerprinting 
– Execution timing detection 
18
FFRI,Inc. 
Environment awareness 
• Checking host environments 
• If malware runs decoy routine then it detects 
analyzerʼ’s sign 
– Malicious behavior never executed 
19 
Initialization 
(unpack) 
Sandbox(incl. VM) 
Detection 
Malicious 
routine 
Decoy 
routine 
If running 
on an analyzing 
environment
FFRI,Inc. 
Sandbox (debug/sandbox/vm) detection 
20 
Host 
Environment aware Malware 
VM 
related 
Artifacts 
Sandbox 
specific 
Artifacts 
VMM? 
Hardware 
Execution 
Environment 
Fingerprinting 
Artifact Fingerprinting 
Execution 
Timing Detection
FFRI,Inc. 
Artifact fingerprinting 
• Sandbox/VM related processes 
– Like vmware, virtualbox etc. 
• Sandbox/VM environment specific files 
• Sandbox/VM environment specific registry keys 
• Sandbox/VM environment specific devices and its attributes 
– ex). QEMU HDD vendor name 
• Sandbox/VM Specific I/O port 
– VMWare backdoor port is most famous artifact in malware 
21
FFRI,Inc. 
Execution environment fingerprinting 
• Using virtual machine implementation specific 
platform value and reaction 
– CPUID instruction result 
– Redpill 
• Using LDT/GDT and IDT incongruousness 
– Interesting research here: Cardinal Pill Testing 
22
FFRI,Inc. 
Execution timing detection 
• For example:using clock count differential  
– Traditional anti-‐‑‒debug technique 
23 
Comparing two 
TSC differentials
FFRI,Inc. 
Targets of today’s presentation 
• Anti-‐‑‒sandbox maneuver 
ü Environment awareness 
• Using result of sandbox detection 
p Stalling code 
p User interaction checks 
 
• Sandbox (debug/sandbox/vm) detection 
ü Artifact fingerprinting 
ü Execution environment fingerprinting 
p Execution timing detection 
24
FFRI,Inc. 
Automatically disarmament system for armed malware with 
anti-‐‑‒sandboxing 
TENTACLE: DESIGN 
25
FFRI,Inc. 
Concept: malware palpation 
1. “Thousand form” sandbox runs malware again 
and again 
– Changing “virtual” artifacts exposure each execution 
for execution branch detection 
2. Retroactive condition analysis 
– Specifying “branch condition” on unnatural process 
termination 
26
FFRI,Inc. 
Malware palpation 
• Sandbox runs same malware again and again 
• Sandbox fakes different sandbox-‐‑‒related 
artifacts each malware execution 
– Detecting execution difference using code execution 
integrity(CEI)  
27 
vmmouse 
.sys 
user-space 
kernel-space 
Runtime  Libraries 
Sandbox  
API 
fakingemulato 
r 
user-space 
kernel-space 
Malware 
(fist execution) 
Runtime  Libraries 
Sandbox  
API 
Not foundemulato 
r 
Malware 
(second execution)
FFRI,Inc. 
Code Execution Integrity(CEI) 
• CEI shows uniqueness of instruction 
execution history  
– Inspired by TPM trust chaining 
• “measurement” per instruction 
28 
Digest[i] = SHA1( fetched CPU instruction + Digest[i-1] ) 
mov $0x616b6157, %eax 
0xb857616b61 
push %ebx 
0x53 
push %eax 
0x50 
mov $4, %edx 
0xba04000000 
mov $1, %ebx 
0xbb01000000 
d[0] = SHA1(0xb857616b61) 
d[1] = SHA1(d[0] + 0x53) 
d[2] = SHA1(d[1] + 0x50) 
d[3] = SHA1(d[2] 
+0xba04000000) 
...
FFRI,Inc. 
Execution branch detection 
• Using execution step count and code 
execution integrity(CEI) value 
29 
in eax, dx; 
cmp ebx, 
jne notVmware 
jmp isVmware 
notVmware: mov rc, 0 
jmp done 
isVmware: mov rc, eax 
jmp done 
CEI[0]1 
CEI[1]1 
CEI[2]1 
CEI[3]1 
CEI[4]1 
CEI[0]2 
CEI[1]2 
CEI[2]2 
CEI[3]2 
CEI[4]2 
CEI[5]2
FFRI,Inc. 
Retroactive condition analysis 
• Sandbox retroactive from 
termination to terminated 
reason API and arguments 
when suspicious termination 
– Only a few steps executions 
– To terminate before network 
activities 
sub esp, 1024 
mov ebx, esp 
push 400h 
push ebx 
push 0h 
call GetModuleFileNameA 
lea eax, MyPath 
push eax 
push ebx 
call lstrcmpA 
test eax, eax 
push 0h 
lea eax, MsgCaption 
push eax 
jz _ok 
lea eax, NGMsgText 
push eax 
push 0h 
call MessageBoxA 
invoke ExitProcess, NULL 
30 
_ok: lea eax, OKMsgText
FFRI,Inc. 
know thyself 
TENTACLE: IMPLEMENTATION 
31
FFRI,Inc. 
Tentacle implementation overview 
32 
• Tentacle based on IA-‐‑‒32 CPU emulator 
user-space 
kernel-space 
Host 
Target’ 
Process 
Runtime  Libraries 
(Virtualized) 
Runtime  Libraries 
FILE’ 
HEAP’ 
CPU Emulator 
Memory 
Context ’ 
Execution 
Context ’
FFRI,Inc. 
IA-32 CPU emulator-based sandbox 
• We have already CPU Emulator-‐‑‒based 
sandbox for win32 execution (in-‐‑‒house use) 
– Like IDA Bochs PE operation mode 
33 
Target Program 
(loaded) 
Decode 
Execution 
CPU Emulator 
Instruction 
Fetch 
Address Resolution 
Applying 
Execution Result
FFRI,Inc. 
IA-32 CPU Emulator: Virtual contexts 
34 
Virtual Process 
Contexts 
Virtual Module(DLL) 
Contexts 
Virtual Resources 
(handle) Contexts 
Virtual Heap 
Contexts 
CPU Emulator 
Process 
Data 
Code 
Target 
Process 
Virtual CPU 
Contexts 
Target Process’s 
VA Space contexts 
DLLs 
Headers
FFRI,Inc. 
IA-32 CPU Emulator: API emulation 
35 
Virtual advapi32.dll 
Functions 
CPU Emulator 
Process 
kernel32.dl l 
user32.dl l 
advapi32.dl l 
msvcrt.dl l 
Target 
Process 
API Emulation 
Components 
DLLs 
… 
Virtual kernel32 
Functions 
Virtual user32.dll 
Functions 
Virtual msvcrt.dll 
Functions 
Virtualized 
Resource Manager
FFRI,Inc. 
Limitations 
• The original CPU emulator supports a limited API 
• The original CPU emulator supports a limited CPU 
instruction 
36
FFRI,Inc. 
Tentacle implementation details 
• Nyarlathotep “Thousand Form” Sandbox 
– Camouflaging sandbox/vm related artifact 
existence  
– Execution branch detection using CEI 
• Retroactive condition analysis 
• Necronomicon 
– Execution logging framework  
37
FFRI,Inc. 
Necronomicon 
• Necrnomicon logs instruction per execution 
– Tracing specific API call and its arguments for 
Retroactive condition analysis 
• lstrcmp, GetModuleFileName, 
GetVolumeNameForVolumeMountPoint… 
• Code execution integrity calculation per 
execution 
– For execution branch detection 
38
FFRI,Inc. 
Nyarlathotep “Thousand Form” Sandbox 
• For example, VMWare related artifacts 
– backdoor port 
– vm-‐‑‒related files (2 files) 
– registry entries (1 entry) 
 
• Sandbox fake “in” instruction result for 
backdoor port check 
• Files and registry entry virtualization used by 
sandboxʼ’s own virtual resource manager 
39
FFRI,Inc. 
Experiments 
• Disarmament #01: Artifact fingerprinting 
sample 
• Disarmament #02: Comparing Disk GUID 
value sample 
• Disarmament #03: Comparing executable file 
path sample 
40
FFRI,Inc. 
Disarmament #01: Artifact fingerprinting sample 
41 
int _tmain(int argc, _TCHAR* argv[]) 
{ 
int count = 0; 
delay(); 
if ( sbdetect_vmware_backdoor_port()  0){ 
printf(VMWare backdoor port detected. I am on the virtual.); 
} 
if ( sbdetect_vmware_sysf01() == 0 ){ 
printf(vmmouse.sys detected. I am on the virtual.n); 
exit(1); 
} 
if ( sbdetect_vmware_sysf02() == 0 ){ 
printf(vmmouse.sys detected. I am on the virtual.n); 
exit(1); 
} 
if ( sbdetect_vmware_reg01() == 0 ){ 
printf(RegKey: SOFTWAREVMware, Inc.VMware Tools 
detected. I am on the virtual.n); 
exit(1); 
} 
//Malicious behavior 
printf(malicious behaviorn”); 
return 0; 
}
FFRI,Inc. 
sbdetect_vmware_backdoor_port() 
42 
int sbdetect_vmware_backdoor_port(void) 
{ 
int rc = 0; 
__try 
{ 
__asm 
{ 
mov eax, 'VMXh' 
mov ebx, 0; 
mov ecx, 0xA 
mov edx, 'VX' // port 
in eax, dx; // read port 
cmp ebx, 'VMXh’ // Vmware echo ‘VMXh’ 
jne notVmware 
jmp isVmware 
notVmware: 
mov rc, 0 
jmp done 
isVmware: 
mov rc, eax 
done: 
} 
} 
__except(EXCEPTION_EXECUTE_HANDLER) 
{ 
rc = 0; 
} 
return rc; 
}
FFRI,Inc. 
sbdetect_vmware_sysf01() 
43 
// 
// Detect proven: Windows 7 32bit 
// Not detected: Windows 7 64bit 
// 
int sbdetect_vmware_sysf01() { 
DWORD ret; 
TCHAR target[255] = %WINDIR%system32driversvmmouse.sys; 
ret = GetFileAttributes(target); 
if( ret != INVALID_FILE_ATTRIBUTES ){ 
return 0; 
} 
else{ 
return 1; 
} 
}
FFRI,Inc. 
sbdetect_vmware_sysf02() 
44 
// 
// Detect proven: Windows 7 32bit 
// Not detected: Windows 7 64bit 
// 
int sbdetect_vmware_sysf02() { 
DWORD ret; 
TCHAR target[255] = %WINDIR%system32driversvmhgfs.sys; 
ret = GetFileAttributes(target); 
if( ret != INVALID_FILE_ATTRIBUTES ){ 
return 0; 
} 
else{ 
return 1; 
} 
}
FFRI,Inc. 
Disarmament #01 
45
FFRI,Inc. 
Disarmament #02: Comparing Disk GUID value 
sample 
46 
.386 
.model flat,stdcall 
option casemap:none 
include masm32includewindows.inc 
include masm32includekernel32.inc 
includelib masm32libkernel32.lib 
include masm32includeuser32.inc 
includelib masm32libuser32.lib 
.data 
DriveC db C:, 0 
VolumeC db ?Volume{8e7e8884-600d-11e4- 
ae07-806e6f6e6963}, 0 
MsgCaption db MESSAGE, 0 
OKMsgText db Normal Message, 0 
NGMsgText db Detect Message, 0 
.code 
start: 
sub esp, 1024 
mov ebx, esp 
sub esp, 4 
mov eax, esp 
push eax 
push ebx 
lea eax, DriveC 
push eax 
call GetVolumeNameForVolumeMountPointA 
lea eax, VolumeC 
push eax 
push ebx 
call lstrcmpA 
test eax, eax 
push 0h 
lea eax, MsgCaption 
push eax 
jz _ok 
lea eax, NGMsgText 
push eax 
push 0h 
call MessageBoxA 
invoke ExitProcess, NULL 
_ok: 
lea eax, OKMsgText 
push eax 
push 0h 
call MessageBoxA 
invoke ExitProcess, NULL 
end start
FFRI,Inc. 
Disarmament #02 
47
FFRI,Inc. 
Disarmament #03 Comparing executable file 
path sample 
48 
.386 
.model flat,stdcall 
option casemap:none 
include masm32includewindows.inc 
include masm32includekernel32.inc 
includelib masm32libkernel32.lib 
include masm32includeuser32.inc 
includelib masm32libuser32.lib 
.data 
MyPath db C:xsample2.exe, 0 
MsgCaption db MESSAGE, 0 
OKMsgText db Normal Message, 0 
NGMsgText db Detect Message, 0 
.code 
start sub esp, 1024 
mov ebx, esp 
push 400h 
push ebx 
push 0h 
call GetModuleFileNameA 
lea eax, MyPath 
push eax 
push ebx 
call lstrcmpA 
test eax, eax 
push 0h 
lea eax, MsgCaption 
push eax 
jz _ok 
lea eax, NGMsgText 
push eax 
push 0h 
call MessageBoxA 
invoke ExitProcess, NULL 
_ok: lea eax, OKMsgText 
push eax 
push 0h 
call MessageBoxA 
invoke ExitProcess, NULL 
end start
FFRI,Inc. 
Disarmament #03 
49
FFRI,Inc. 
Future work 
• Improving anti-‐‑‒sandbox detection  
– Stalling code detection and evasion 
• Improving sandbox quality 
50
FFRI,Inc. 
Conclusions 
• This is proof of concept of automatically 
disarmament system for armed malware 
with anti-‐‑‒sandboxing with CPU emulator-‐‑‒ 
based sandbox 
• We introduced anti-‐‑‒sandbox taxonomy 
 
51 
Know thy self, know thy enemy. A thousand 
battles, a thousand victories.- Sun Tzu
FFRI,Inc. 
Bibliography 
• Analyzing Environment-Aware Malware, Lastline, 2014.05.25(viewed) 
http://labs.lastline.com/analyzing-environment-aware-malware-a-look-at-zeus-trojan-variant-called-citadel-evading-traditional-sandboxes 
• Martina Lindorfer, Clemens Kolbitsch, and Paolo Milani Comparetti. 2011. Detecting environment-sensitive malware. In Proceedings of the 
14th international conference on Recent Advances in Intrusion Detection (RAID'11). Springer-Verlag, Berlin, Heidelberg, 338-357. 
• lemens Kolbitsch, Engin Kirda, and Christopher Kruegel. 2011. The power of procrastination: detection and mitigation of execution-stalling 
malicious code. In Proceedings of the 18th ACM conference on Computer and communications security (CCS '11). ACM, New York, NY, 
USA, 285-296. 
• Min Gyung Kang, Heng Yin, Steve Hanna, Stephen McCamant, and Dawn Song. 2009. Emulating emulation-resistant malware. In 
Proceedings of the 1st ACM workshop on Virtual machine security (VMSec '09). ACM, New York, NY, USA, 11-22. 
• Dhilung Kirat, Giovanni Vigna, and Christopher Kruegel. 2014. Barecloud: bare-metal analysis-based evasive malware detection. In 
Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA, 287-301. 
• Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda, and Christopher Kruegel. 2009. A view on current malware behaviors. In 
Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more (LEET'09). 
USENIX Association, Berkeley, CA, USA, 8-8. 
• Aurélien Wailly. Malware vs Virtualization The endless cat and mouse play, 2014.05.25(viewed) 
http://aurelien.wail.ly/publications/hip-2013-slides.html 
• Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2009. Testing CPU emulators. In Proceedings of the 
eighteenth international symposium on Software testing and analysis (ISSTA '09). ACM, New York, NY, USA, 261-272. 
• Hao Shi, Abdulla Alwabel and Jelena Mirkovic. 2014. Cardinal Pill Testing of System Virtual Machines. In Proceedings of the 23rd USENIX 
conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA,271-285. 
• Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2010. Testing system virtual machines. In Proceedings 
of the 19th international symposium on Software testing and analysis (ISSTA '10). ACM, New York, NY, USA, 171-182. 
• IDA Boch PE operation mode 
https://www.hex-rays.com/products/ida/support/idadoc/1332.shtml 
52
FFRI,Inc. 
53 
Thank you ! 
FFRI, Inc. 
http://www.ffri.jp

More Related Content

What's hot

Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaTake a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaCODE BLUE
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesPeter Hlavaty
 
How to drive a malware analyst crazy
How to drive a malware analyst crazyHow to drive a malware analyst crazy
How to drive a malware analyst crazyMichael Boman
 
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Shota Shinogi
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco GrassiShakacon
 
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON
 
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" Peter Hlavaty
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Manich Koomsusi
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programmingkozossakai
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...DefconRussia
 
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...CODE BLUE
 
Injection on Steroids: Codeless code injection and 0-day techniques
Injection on Steroids: Codeless code injection and 0-day techniquesInjection on Steroids: Codeless code injection and 0-day techniques
Injection on Steroids: Codeless code injection and 0-day techniquesenSilo
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyFFRI, Inc.
 
Auditing the Opensource Kernels
Auditing the Opensource KernelsAuditing the Opensource Kernels
Auditing the Opensource KernelsSilvio Cesare
 
Indicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationMichael Boman
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon chinaPeter Hlavaty
 
How Safe is your Link ?
How Safe is your Link ?How Safe is your Link ?
How Safe is your Link ?Peter Hlavaty
 

What's hot (20)

Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru OtsukaTake a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
Take a Jailbreak -Stunning Guards for iOS Jailbreak- by Kaoru Otsuka
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
 
How to drive a malware analyst crazy
How to drive a malware analyst crazyHow to drive a malware analyst crazy
How to drive a malware analyst crazy
 
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
 
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
 
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON London - Attacking VxWorks: from Stone Age to Interstellar
 
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel" You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Possibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented ProgrammingPossibility of arbitrary code execution by Step-Oriented Programming
Possibility of arbitrary code execution by Step-Oriented Programming
 
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case Study - ...
 
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
 
Injection on Steroids: Codeless code injection and 0-day techniques
Injection on Steroids: Codeless code injection and 0-day techniquesInjection on Steroids: Codeless code injection and 0-day techniques
Injection on Steroids: Codeless code injection and 0-day techniques
 
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization TechnologyA Hypervisor IPS based on Hardware Assisted Virtualization Technology
A Hypervisor IPS based on Hardware Assisted Virtualization Technology
 
Auditing the Opensource Kernels
Auditing the Opensource KernelsAuditing the Opensource Kernels
Auditing the Opensource Kernels
 
Indicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradication
 
ShinoBOT Suite
ShinoBOT SuiteShinoBOT Suite
ShinoBOT Suite
 
Attack on the Core
Attack on the CoreAttack on the Core
Attack on the Core
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
How Safe is your Link ?
How Safe is your Link ?How Safe is your Link ?
How Safe is your Link ?
 
AntiRE en Masse
AntiRE en MasseAntiRE en Masse
AntiRE en Masse
 

Similar to TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)

From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...Priyanka Aash
 
Mr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_engMr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_engFFRI, Inc.
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesScott K. Larson
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22MichaelM85042
 
Thinking Outside the Sand[box]
Thinking Outside the Sand[box]Thinking Outside the Sand[box]
Thinking Outside the Sand[box]Juniper Networks
 
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Lastline, Inc.
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceJason Choi
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxbriancrawford30935
 
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022MichaelM85042
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesAbhishek Singh
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...The Linux Foundation
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisTamas K Lengyel
 
Meder Kydyraliev - Mining Mach Services within OS X Sandbox
Meder Kydyraliev - Mining Mach Services within OS X SandboxMeder Kydyraliev - Mining Mach Services within OS X Sandbox
Meder Kydyraliev - Mining Mach Services within OS X SandboxDefconRussia
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuRob Ragan
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware GenerationStephan Chenette
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 

Similar to TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014) (20)

From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
 
Mr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_engMr201309 automated on-execute_test_using_virtual_box_eng
Mr201309 automated on-execute_test_using_virtual_box_eng
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
 
EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22EMBA Firmware analysis - TROOPERS22
EMBA Firmware analysis - TROOPERS22
 
Thinking Outside the Sand[box]
Thinking Outside the Sand[box]Thinking Outside the Sand[box]
Thinking Outside the Sand[box]
 
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docx
 
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022EMBA - Firmware analysis DEFCON30 demolabs USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysis
 
Meder Kydyraliev - Mining Mach Services within OS X Sandbox
Meder Kydyraliev - Mining Mach Services within OS X SandboxMeder Kydyraliev - Mining Mach Services within OS X Sandbox
Meder Kydyraliev - Mining Mach Services within OS X Sandbox
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
The Future of Automated Malware Generation
The Future of Automated Malware GenerationThe Future of Automated Malware Generation
The Future of Automated Malware Generation
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 

More from FFRI, Inc.

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMFFRI, Inc.
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) FFRI, Inc.
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...FFRI, Inc.
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) FFRI, Inc.
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) FFRI, Inc.
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)FFRI, Inc.
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...FFRI, Inc.
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)FFRI, Inc.
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)FFRI, Inc.
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) FFRI, Inc.
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)FFRI, Inc.
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)FFRI, Inc.
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...FFRI, Inc.
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)FFRI, Inc.
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...FFRI, Inc.
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)FFRI, Inc.
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)FFRI, Inc.
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 

More from FFRI, Inc. (20)

Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARMAppearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
 
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017) TrustZone use case and trend (FFRI Monthly Research Mar 2017)
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
 
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
 
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017) An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
 
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016) Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
 
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
 
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
 
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
 
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)Black Hat USA 2016  Survey Report (FFRI Monthly Research 2016.8)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
 
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7) About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
 
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
 
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
 
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
 
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
 
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
 
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)

  • 1. FFRI,Inc. PacSec 2014 TENTACLE: Environment-Sensitive Malware Palpation FFRI, Inc. http://www.ffri.jp Ver 2.00.01 1 Yosuke Chubachi, Kenji Aiko
  • 2. FFRI,Inc. About us 2 Yosuke Chubachi is a security engineer at FFRI, Inc. since this spring. He studied at the graduate school of information system engineering, University of Tsukuba. He is a Security Camp lecturer and a member of executive committee of SECCON since 2012. Kenji Aiko is a programmer at FFRI, Inc., and is a one of the developers of "FFRI yarai" which is a targeted attack protection software. He is a Security Camp lecturer and a member of executive committee of SECCON since 2012.
  • 3. FFRI,Inc. Contents • Background/Motivation • Taxonomy of anti-‐‑‒sandbox techniques • Tentacle Design • Implementation • Experiments • Conclusion 3
  • 4. FFRI,Inc. Background • Malware explosion – 120,000,000/recent year • Antivirus is dead…? 4 AV Test: Statistics –New Malware- (Nov. 05 2014 viewed) http://www.av-test.org/en/statistics/malware/
  • 5. FFRI,Inc. We need dynamic and automated malware analysis • “Scalability” is most important factor in information explosion era – Cloud – Bigdata – IoT • Malware analysis also needs “scalable” methodology – Automation is justice 5
  • 6. FFRI,Inc. Obi wan said, “Use the sandbox, Luke” • Security engineer and researcher use sandbox environment for malware analyzing • Automated dynamic analysis technology also based on VM/application sandbox – Anubis(online sandbox) – Cuckoo Sandbox(VirtualBox base) – Some commercial UTM Appliance – Some commercial endpoint security solution 6
  • 7. FFRI,Inc. Sophisticated malware strike back • Sophisticated malware arms many anti-‐‑‒ analyze techniques • Naturally using targeted attacks, cyber espionage, banking malware • We called those malware “evasive malware” 7
  • 8. FFRI,Inc. Related work • BareCloud [Dhilung K et al., USENIX SECʼ’14] – “5,835 evasive malware out of 110,005 recent samples” • Prevalent Characteristics in Modern Malware [Gabriel et al., BH USA ʻ‘14] – “80% malware detect vmware using backdoor port” 8 What do you think?
  • 9. FFRI,Inc. Case study: Citadel • Some citadel detects the execution environment and do not engage in malicious behavior when the current host differs from the infected host – To avoid dynamic malware detection(like sandbox analysis) • Showing 2 examples – Host-‐‑‒fingerprinting – VM/Sandbox detection 9
  • 10. FFRI,Inc. Host-fingerprinting • Embedding infected hostʼ’s unique value into execution binary 10 Citadel Unpacker Malicious code Self-rewriting when original malware execution Environment-sensitive Citade l Unpacker Malicious code with host unique value Different signature pattern
  • 11. FFRI,Inc. Host-fingerprinting(cont’d) • Getting GUID on system drive using the GetVolumeNameForVolumeMountPoint() • Comparing running hostʼ’s GUID value and embedded infected hostʼ’s value • Process executes malicious code if GUID values are consistent 11 Infected host’s GUID(packed) Unpacked GUID Format: {XXXXXXXX-XXXX-XXXX-XXXXXXXX} Unpack Environment-sensitive Citade l Unpacker Malicious code with host unique value
  • 12. FFRI,Inc. VM/Sandbox detection • Checking processʼ’s product name – like ”*vmware*”, ”*virtualbox” • Scanning specific files and devices – C:popupkiller.exe – C:stimulator.exe – C:TOOLSexecute.exe – .NPF_̲NdisWanIp – .HGFS – .vmci – .VBoxGuest 12
  • 13. FFRI,Inc. Citadel behavior of host/environment inconsistency • For example: – Process termination – Running fake(or harmless) code 13 Not really matter A serious matter Initialization (unpack) Sandbox(incl. VM) Detection Malicious routine Decoy routine If running on an analyzing environment
  • 14. FFRI,Inc. Citadel runtime activities 14 Initialization Scouting Malicious Behavior Memory Persistent unpack storage Environment-awareness Network Host fingerprinting Malicious code execution Code injection Connecting CC server Unauthorized Access
  • 15. FFRI,Inc. Aim of evasive malware • Signature-‐‑‒based AV detection avoiding • Anti-‐‑‒analyzing – Anti-‐‑‒security engineer – Sandbox evasion 15
  • 16. FFRI,Inc. Motivation • An automatic investigation into a condition used by sandbox evasion – Faking bare-‐‑‒metal environment on sandboxes 16 InitializationSandbox(incl. VM) Pass! (unpack) Detection Malicious routine Transparent Sandbox Using Investigated Conditions
  • 17. FFRI,Inc. Know Your Enemy TAXONOMY OF ANTI-SANDBOX 17
  • 18. FFRI,Inc. Taxonomy of anti-sandbox techniques • Anti-‐‑‒sandbox maneuver – Environment awareness • Using result of sandbox detection – (Stalling code) – (User interaction checks) • Sandbox (debug/sandbox/vm) detection – Artifact fingerprinting – Execution environment fingerprinting – Execution timing detection 18
  • 19. FFRI,Inc. Environment awareness • Checking host environments • If malware runs decoy routine then it detects analyzerʼ’s sign – Malicious behavior never executed 19 Initialization (unpack) Sandbox(incl. VM) Detection Malicious routine Decoy routine If running on an analyzing environment
  • 20. FFRI,Inc. Sandbox (debug/sandbox/vm) detection 20 Host Environment aware Malware VM related Artifacts Sandbox specific Artifacts VMM? Hardware Execution Environment Fingerprinting Artifact Fingerprinting Execution Timing Detection
  • 21. FFRI,Inc. Artifact fingerprinting • Sandbox/VM related processes – Like vmware, virtualbox etc. • Sandbox/VM environment specific files • Sandbox/VM environment specific registry keys • Sandbox/VM environment specific devices and its attributes – ex). QEMU HDD vendor name • Sandbox/VM Specific I/O port – VMWare backdoor port is most famous artifact in malware 21
  • 22. FFRI,Inc. Execution environment fingerprinting • Using virtual machine implementation specific platform value and reaction – CPUID instruction result – Redpill • Using LDT/GDT and IDT incongruousness – Interesting research here: Cardinal Pill Testing 22
  • 23. FFRI,Inc. Execution timing detection • For example:using clock count differential – Traditional anti-‐‑‒debug technique 23 Comparing two TSC differentials
  • 24. FFRI,Inc. Targets of today’s presentation • Anti-‐‑‒sandbox maneuver ü Environment awareness • Using result of sandbox detection p Stalling code p User interaction checks • Sandbox (debug/sandbox/vm) detection ü Artifact fingerprinting ü Execution environment fingerprinting p Execution timing detection 24
  • 25. FFRI,Inc. Automatically disarmament system for armed malware with anti-‐‑‒sandboxing TENTACLE: DESIGN 25
  • 26. FFRI,Inc. Concept: malware palpation 1. “Thousand form” sandbox runs malware again and again – Changing “virtual” artifacts exposure each execution for execution branch detection 2. Retroactive condition analysis – Specifying “branch condition” on unnatural process termination 26
  • 27. FFRI,Inc. Malware palpation • Sandbox runs same malware again and again • Sandbox fakes different sandbox-‐‑‒related artifacts each malware execution – Detecting execution difference using code execution integrity(CEI) 27 vmmouse .sys user-space kernel-space Runtime Libraries Sandbox API fakingemulato r user-space kernel-space Malware (fist execution) Runtime Libraries Sandbox API Not foundemulato r Malware (second execution)
  • 28. FFRI,Inc. Code Execution Integrity(CEI) • CEI shows uniqueness of instruction execution history – Inspired by TPM trust chaining • “measurement” per instruction 28 Digest[i] = SHA1( fetched CPU instruction + Digest[i-1] ) mov $0x616b6157, %eax 0xb857616b61 push %ebx 0x53 push %eax 0x50 mov $4, %edx 0xba04000000 mov $1, %ebx 0xbb01000000 d[0] = SHA1(0xb857616b61) d[1] = SHA1(d[0] + 0x53) d[2] = SHA1(d[1] + 0x50) d[3] = SHA1(d[2] +0xba04000000) ...
  • 29. FFRI,Inc. Execution branch detection • Using execution step count and code execution integrity(CEI) value 29 in eax, dx; cmp ebx, jne notVmware jmp isVmware notVmware: mov rc, 0 jmp done isVmware: mov rc, eax jmp done CEI[0]1 CEI[1]1 CEI[2]1 CEI[3]1 CEI[4]1 CEI[0]2 CEI[1]2 CEI[2]2 CEI[3]2 CEI[4]2 CEI[5]2
  • 30. FFRI,Inc. Retroactive condition analysis • Sandbox retroactive from termination to terminated reason API and arguments when suspicious termination – Only a few steps executions – To terminate before network activities sub esp, 1024 mov ebx, esp push 400h push ebx push 0h call GetModuleFileNameA lea eax, MyPath push eax push ebx call lstrcmpA test eax, eax push 0h lea eax, MsgCaption push eax jz _ok lea eax, NGMsgText push eax push 0h call MessageBoxA invoke ExitProcess, NULL 30 _ok: lea eax, OKMsgText
  • 31. FFRI,Inc. know thyself TENTACLE: IMPLEMENTATION 31
  • 32. FFRI,Inc. Tentacle implementation overview 32 • Tentacle based on IA-‐‑‒32 CPU emulator user-space kernel-space Host Target’ Process Runtime Libraries (Virtualized) Runtime Libraries FILE’ HEAP’ CPU Emulator Memory Context ’ Execution Context ’
  • 33. FFRI,Inc. IA-32 CPU emulator-based sandbox • We have already CPU Emulator-‐‑‒based sandbox for win32 execution (in-‐‑‒house use) – Like IDA Bochs PE operation mode 33 Target Program (loaded) Decode Execution CPU Emulator Instruction Fetch Address Resolution Applying Execution Result
  • 34. FFRI,Inc. IA-32 CPU Emulator: Virtual contexts 34 Virtual Process Contexts Virtual Module(DLL) Contexts Virtual Resources (handle) Contexts Virtual Heap Contexts CPU Emulator Process Data Code Target Process Virtual CPU Contexts Target Process’s VA Space contexts DLLs Headers
  • 35. FFRI,Inc. IA-32 CPU Emulator: API emulation 35 Virtual advapi32.dll Functions CPU Emulator Process kernel32.dl l user32.dl l advapi32.dl l msvcrt.dl l Target Process API Emulation Components DLLs … Virtual kernel32 Functions Virtual user32.dll Functions Virtual msvcrt.dll Functions Virtualized Resource Manager
  • 36. FFRI,Inc. Limitations • The original CPU emulator supports a limited API • The original CPU emulator supports a limited CPU instruction 36
  • 37. FFRI,Inc. Tentacle implementation details • Nyarlathotep “Thousand Form” Sandbox – Camouflaging sandbox/vm related artifact existence – Execution branch detection using CEI • Retroactive condition analysis • Necronomicon – Execution logging framework 37
  • 38. FFRI,Inc. Necronomicon • Necrnomicon logs instruction per execution – Tracing specific API call and its arguments for Retroactive condition analysis • lstrcmp, GetModuleFileName, GetVolumeNameForVolumeMountPoint… • Code execution integrity calculation per execution – For execution branch detection 38
  • 39. FFRI,Inc. Nyarlathotep “Thousand Form” Sandbox • For example, VMWare related artifacts – backdoor port – vm-‐‑‒related files (2 files) – registry entries (1 entry) • Sandbox fake “in” instruction result for backdoor port check • Files and registry entry virtualization used by sandboxʼ’s own virtual resource manager 39
  • 40. FFRI,Inc. Experiments • Disarmament #01: Artifact fingerprinting sample • Disarmament #02: Comparing Disk GUID value sample • Disarmament #03: Comparing executable file path sample 40
  • 41. FFRI,Inc. Disarmament #01: Artifact fingerprinting sample 41 int _tmain(int argc, _TCHAR* argv[]) { int count = 0; delay(); if ( sbdetect_vmware_backdoor_port() 0){ printf(VMWare backdoor port detected. I am on the virtual.); } if ( sbdetect_vmware_sysf01() == 0 ){ printf(vmmouse.sys detected. I am on the virtual.n); exit(1); } if ( sbdetect_vmware_sysf02() == 0 ){ printf(vmmouse.sys detected. I am on the virtual.n); exit(1); } if ( sbdetect_vmware_reg01() == 0 ){ printf(RegKey: SOFTWAREVMware, Inc.VMware Tools detected. I am on the virtual.n); exit(1); } //Malicious behavior printf(malicious behaviorn”); return 0; }
  • 42. FFRI,Inc. sbdetect_vmware_backdoor_port() 42 int sbdetect_vmware_backdoor_port(void) { int rc = 0; __try { __asm { mov eax, 'VMXh' mov ebx, 0; mov ecx, 0xA mov edx, 'VX' // port in eax, dx; // read port cmp ebx, 'VMXh’ // Vmware echo ‘VMXh’ jne notVmware jmp isVmware notVmware: mov rc, 0 jmp done isVmware: mov rc, eax done: } } __except(EXCEPTION_EXECUTE_HANDLER) { rc = 0; } return rc; }
  • 43. FFRI,Inc. sbdetect_vmware_sysf01() 43 // // Detect proven: Windows 7 32bit // Not detected: Windows 7 64bit // int sbdetect_vmware_sysf01() { DWORD ret; TCHAR target[255] = %WINDIR%system32driversvmmouse.sys; ret = GetFileAttributes(target); if( ret != INVALID_FILE_ATTRIBUTES ){ return 0; } else{ return 1; } }
  • 44. FFRI,Inc. sbdetect_vmware_sysf02() 44 // // Detect proven: Windows 7 32bit // Not detected: Windows 7 64bit // int sbdetect_vmware_sysf02() { DWORD ret; TCHAR target[255] = %WINDIR%system32driversvmhgfs.sys; ret = GetFileAttributes(target); if( ret != INVALID_FILE_ATTRIBUTES ){ return 0; } else{ return 1; } }
  • 46. FFRI,Inc. Disarmament #02: Comparing Disk GUID value sample 46 .386 .model flat,stdcall option casemap:none include masm32includewindows.inc include masm32includekernel32.inc includelib masm32libkernel32.lib include masm32includeuser32.inc includelib masm32libuser32.lib .data DriveC db C:, 0 VolumeC db ?Volume{8e7e8884-600d-11e4- ae07-806e6f6e6963}, 0 MsgCaption db MESSAGE, 0 OKMsgText db Normal Message, 0 NGMsgText db Detect Message, 0 .code start: sub esp, 1024 mov ebx, esp sub esp, 4 mov eax, esp push eax push ebx lea eax, DriveC push eax call GetVolumeNameForVolumeMountPointA lea eax, VolumeC push eax push ebx call lstrcmpA test eax, eax push 0h lea eax, MsgCaption push eax jz _ok lea eax, NGMsgText push eax push 0h call MessageBoxA invoke ExitProcess, NULL _ok: lea eax, OKMsgText push eax push 0h call MessageBoxA invoke ExitProcess, NULL end start
  • 48. FFRI,Inc. Disarmament #03 Comparing executable file path sample 48 .386 .model flat,stdcall option casemap:none include masm32includewindows.inc include masm32includekernel32.inc includelib masm32libkernel32.lib include masm32includeuser32.inc includelib masm32libuser32.lib .data MyPath db C:xsample2.exe, 0 MsgCaption db MESSAGE, 0 OKMsgText db Normal Message, 0 NGMsgText db Detect Message, 0 .code start sub esp, 1024 mov ebx, esp push 400h push ebx push 0h call GetModuleFileNameA lea eax, MyPath push eax push ebx call lstrcmpA test eax, eax push 0h lea eax, MsgCaption push eax jz _ok lea eax, NGMsgText push eax push 0h call MessageBoxA invoke ExitProcess, NULL _ok: lea eax, OKMsgText push eax push 0h call MessageBoxA invoke ExitProcess, NULL end start
  • 50. FFRI,Inc. Future work • Improving anti-‐‑‒sandbox detection – Stalling code detection and evasion • Improving sandbox quality 50
  • 51. FFRI,Inc. Conclusions • This is proof of concept of automatically disarmament system for armed malware with anti-‐‑‒sandboxing with CPU emulator-‐‑‒ based sandbox • We introduced anti-‐‑‒sandbox taxonomy 51 Know thy self, know thy enemy. A thousand battles, a thousand victories.- Sun Tzu
  • 52. FFRI,Inc. Bibliography • Analyzing Environment-Aware Malware, Lastline, 2014.05.25(viewed) http://labs.lastline.com/analyzing-environment-aware-malware-a-look-at-zeus-trojan-variant-called-citadel-evading-traditional-sandboxes • Martina Lindorfer, Clemens Kolbitsch, and Paolo Milani Comparetti. 2011. Detecting environment-sensitive malware. In Proceedings of the 14th international conference on Recent Advances in Intrusion Detection (RAID'11). Springer-Verlag, Berlin, Heidelberg, 338-357. • lemens Kolbitsch, Engin Kirda, and Christopher Kruegel. 2011. The power of procrastination: detection and mitigation of execution-stalling malicious code. In Proceedings of the 18th ACM conference on Computer and communications security (CCS '11). ACM, New York, NY, USA, 285-296. • Min Gyung Kang, Heng Yin, Steve Hanna, Stephen McCamant, and Dawn Song. 2009. Emulating emulation-resistant malware. In Proceedings of the 1st ACM workshop on Virtual machine security (VMSec '09). ACM, New York, NY, USA, 11-22. • Dhilung Kirat, Giovanni Vigna, and Christopher Kruegel. 2014. Barecloud: bare-metal analysis-based evasive malware detection. In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA, 287-301. • Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda, and Christopher Kruegel. 2009. A view on current malware behaviors. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more (LEET'09). USENIX Association, Berkeley, CA, USA, 8-8. • Aurélien Wailly. Malware vs Virtualization The endless cat and mouse play, 2014.05.25(viewed) http://aurelien.wail.ly/publications/hip-2013-slides.html • Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2009. Testing CPU emulators. In Proceedings of the eighteenth international symposium on Software testing and analysis (ISSTA '09). ACM, New York, NY, USA, 261-272. • Hao Shi, Abdulla Alwabel and Jelena Mirkovic. 2014. Cardinal Pill Testing of System Virtual Machines. In Proceedings of the 23rd USENIX conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA,271-285. • Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, and Danilo Bruschi. 2010. Testing system virtual machines. In Proceedings of the 19th international symposium on Software testing and analysis (ISSTA '10). ACM, New York, NY, USA, 171-182. • IDA Boch PE operation mode https://www.hex-rays.com/products/ida/support/idadoc/1332.shtml 52
  • 53. FFRI,Inc. 53 Thank you ! FFRI, Inc. http://www.ffri.jp