Techniques, Tools, and Research Issues

Slides:



Advertisements
Similar presentations
What to expect.  Linux  Windows Server (2008 or 2012)
Advertisements

Project – 564 Presented by Abu Sayeed Saifullah Student Id
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Hacker Tools.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Hands-on: Capturing an Image with AccessData FTK Imager
Working with Workgroups and Domains
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 6 Basic TCP/IP Services.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
Hands-On Virtual Computing
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Simple Mail Transfer Protocol (SMTP)
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Stealing Passwords Remotely & Malware Analysis PacITPros May 8, 2012.
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Go to Start >> Programs >> Outlook Express ( as shown)
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Digital Rights Management: Shareware Yue Wang 24 Nov 2004.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Module 54 (Cellular Telephone Network Security)
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 2. Malware Analysis in VMs
Bentley Systems, Incorporated
Instructor Materials Chapter 10: Application Layer
Topic 7 Malware Analysis Basics
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Backdoor Attacks.
Configuring Windows Firewall with Advanced Security
Techniques, Tools, and Research Issues
Primary Intelligence Categories
Techniques, Tools, and Research Issues
Working at a Small-to-Medium Business or ISP – Chapter 7
How to Install and Setup Quick Heal Antivirus Call
Welcome To : Group 1 VC Presentation
Module 3 Building a web app.
Hands-On Virtualization in the Classroom
Working at a Small-to-Medium Business or ISP – Chapter 7
Part 1: Basic Analysis Chapter 1: Basic Static Techniques
Chapter 2. Malware Analysis in VMs
Information Security Session October 24, 2005
Chapter 3. Basic Dynamic Analysis
Working at a Small-to-Medium Business or ISP – Chapter 7
HC Hyper-V Module GUI Portal VPS Templates Web Console
OPS235: Configuring a Network Using Virtual Machines – Part 2
SharePoint services Provides team collaboration through SharePoint Sites and makes it easy for communities to work together on documents, tasks, contacts,
Applications Layer Functionality & Protocols
Basic Dynamic Analysis VMs and Sandboxes
Web Servers (IIS and Apache)
Talking Malware Analysis with MITRE
SHELLSHOCK ATTACK.
Presentation transcript:

Techniques, Tools, and Research Issues Virus Analysis Techniques, Tools, and Research Issues Part III: Malware Analysis Techniques - Basic Michael Venable Arun Lakhotia University of Louisiana at Lafayette, USA

Malware Analysis Techniques - Basic Demonstrate by Example Analyze Beagle.J Prepare the Lab Malware Analysis Process Static Analysis Process Observation Network observation

Prepare the Lab Create a shared folder for copying malware to guest OS

Prepare the Lab Navigate to \\.host\ from within guest OS to find malware sample Copy sample to guest OS

Prepare the Lab Secure the system Network type  Host-only Shared Folders  Disabled Guest isolation  Disabled

Prepare the Lab Unzip malware sample Take snapshot of virtual system Password: “malware” Take snapshot of virtual system

Malware Analysis Process Reset Lab Environment Static Analysis Set up network observation tools Set up process observation tools Run program Observe network traffic Observe process actions Identify services requested Create/revise client on Linux Create DNS tables Run client Run services on Linux

Beagle.J Capabilities Registry/Run on startup Copies into folders containing “shar” Sends copies by email Backdoor

Static Analysis Guessing program behavior from its strings Using BinText Detect UPX compression Using Disassembler UPX Decompression

String Extraction BinText reveals illegible strings

Dissassembly IDA Pro shows file is UPX compressed

UPX Decompression

String Analysis Analysis of the decompressed file reveals much more

String Analysis Results “SOFTWARE\Microsoft\Windows\CurrentVersion\Run” Registers itself to run on startup Suspicious EXE filenames (ex: “acdsee 9.exe”) Possibly for propagation “MAIL FROM:<%s>”, “RCPT TO:<%s>” Contains SMTP engine EXE filenames used by AV programs (ex: “update.exe”) Possibly kills processes belonging to AV programs

Dynamic Analysis: Host Side Prepare process observation tools Processes spawned by malware Registry changes File system changes Prepare network observation tools Open ports Network traffic

Observe: Processes spawned jjkxhbx.exe spawns irun4.exe

Observe: System Changes RegShot output

Observe: System Changes RegShot output File created called c:\winnt\system32\irun4.exe File created called c:\winnt\system32\irun4.exeopen c:\winnt\system32\irun4.exe configured to run on startup Several files added to c:\shared files

Observe: File System changes jjkjxhbx.exe creates irun4.exe

Observe: Registry Changes jjkjxhbx.exe adds c:\winnt\system32\irun4.exe to HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\ Run\ssate.exe

Observe: Compare Copies c:\winnt\system32\irun4.exe and files placed in c:\shared files are identical copies of jjkjxhbx.exe c:\winnt\system32\irun4.exeopen is not a copy of jjkjxhbx.exe

Observe: Opening Backdoor irun4.exe listens for a connection on TCP port 2745

Dynamic Analysis: Network Detect email propagation

Observe: Email Propagation Set RedHat Linux system as DNS server in Windows Run malware while observing with Snort

Observe: Email Propagation Communication over port 53 Port 53 is used for DNS lookup Performs DNS lookup on sysinternals.com, winternals.com, and others. (Why?)

Observe: Email Propagation FileMon shows irun4.exe scans disk contents Perhaps the domain names were picked up from the hard disk

Observe: Email Propagation A search through the files confirms our suspicions

Summary Lab Setup Analysis Process Virtual environments Security procedures Analysis Process Guess behavior from strings Host side observations files and registry changes, processes spawned, backdoors Network side observations Services requested