0% found this document useful (0 votes)
17 views19 pages

N .Whitepaper

Uploaded by

rotedi4150
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views19 pages

N .Whitepaper

Uploaded by

rotedi4150
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

A new approach

to malware

analysis
02

Table of contents

04 Sandboxes

05 Interactive sandbox

06 Malware Detection

07 Interactivity Throws-Off Malware Evasion


Techniques

08 Interactive malware analysis

09 Benefits of interactive malware analysis

11 Use cases of deep analysis with ANY.RUN

17 A platform for education

19 Final words
03

Malware is a constant threat to organizations around the world. Open an


email and you may lose a lot of money, data, and reputation. Different
tools can help to overcome these situations.

After the attack cybersecurity analytics usually collect and investigate a


malicious program to find out its type and functions. The best way to do
this safely is by sandboxing.

Today, most malware samples are polymorphic. This means that they are
equipped with a mutation engine that can change certain parameters like
file names and hash sums, completely throwing off antiviruses. Emotet
Trojan and Qbot are examples of widely known malware families that use
polymorphism.

One way to overcome the challenge is to use sandboxes.

04

Sandboxes
A sandbox is a tool for executing suspicious programs from untrusted
sources in a safe environment for the host machine. There are different
approaches to the analysis in sandboxes. They can be automated or
interactive.

Online automated sandboxes allow you to upload a sample and get a


report about its behavior. This is a good solution especially compared to
assembling and configuring a separate machine for these needs.

Unfortunately, modern malicious programs can understand whether they


are run on a virtual machine or a real computer. They require users to be
active during execution. And you need is to deploy your own virtual
environment, install operation systems, and set software needed for
dynamic analysis to intercept traffic, monitor file changes, etc.

Moreover, changing settings to every file takes a lot of time and anyway,
you can’t affect it directly. We should keep in mind that analysis doesn’t
always follow the line and things may not work out as planned for this very
sample.

Finally, it’s lacking the speed we need, as we have to wait up to half an hour
for the whole cycle of analysis to finish. All of these cons may cause
damage to the security if an unusual sample remains undetected.
Thankfully, now we have interactive sandboxes.

This is where ANY.RUN comes in.

05

Interactive sandbox
ANY.RUN is an interactive malware analysis sandbox. All cybersecurity
specialists can use the platform from students to experts. The service
detects, analyzes, and monitors cybersecurity threats. A user-friendly
interface allows performing effective and qualitative investigations.

ANY.RUN company was founded in 2016. Since that time, it has held a
leading position among platforms that detect malicious programs. 150k
malware analytics work with the service every day. And a lot of users
benefit from the platform’s results of the investigation. Large organizations
from finance, healthcare, trading, and many other sectors use ANY.RUN
and keep their data safe.

The service shows all processes in real-time. And an analyst can notice all
malicious operations before the final version of the report.

Besides that, the community has numerous investigators all over the world
who take part in the threat intelligence platform. ANY.RUN comprises over
2 million public submissions and this vast malware database is updated
daily. Users can collect new samples and IOCs using this database. You
can work individually or in a team. Tasks that you create may be public or
private. The advantage is that you can save your money using ANY.RUN
instead of wasting it on extra equipment and useless tools.

06

Malware Detection
Before analyzing malware or dealing with the consequences of an attack
the analyst needs to detect the threat. Unfortunately, with modern malware
using so many anti-detection techniques, relying on automatic tools is not
enough anymore.

One of the ways is to use signatures to detect malicious programs. When


threat actors took to the internet way in the past, they gained a way to
distribute malware in horrifying quantities that security professionals
couldn’t imagine at the time. In response, pioneers of the cybersecurity
industry developed early AV software that incorporated what is now known
as signature-based detection.

With signature-based detection, the AV software constantly analyses files


and assigns a unique signature or hash to each. A hash is then added to
the global online database. Antiviruses tap into that database and compare
files against known hashes associated with malicious activity. If there is a
match, the antivirus isolates the file.

Signature-based detection has been a staple of malware detection, but it’s


slowly becoming less effective. And the new interactive approach steps up.

07

Interactivity
Throws-Off Malware
Evasion Techniques
Interactive analysis is becoming more popular every day. It can be used
both for the analysis of regular samples and is also not replaceable if you
come across unique malware samples. Let’s explore what interactive
analysis is, and what are the main benefits.

ANY.RUN can trick malware into executing as if it was launching on a real


machine because the service is interactive. As a user, you can influence
the simulation at any time and interact with the virtual environment: drag a
mouse, tap keys, and so on. You can also control an extensive list of
simulation parameters like setting up a virtual OS version.

With all of the above, the simulation can be corrected when a researcher
notices that something strange is going.

08

Interactive malware
analysis
The goal of malware analysis is to research a malicious sample: its
functions, origin, and possible effects on the infected system. This
data allows analysts to detect malware, react to the attack effectively,
and enhance security.

Generally, there are two ways of how to perform malware analysis:

Static Analysis: get information about a malicious program without


running, just having a look at it. With this approach, you can
investigate content data, patterns, attributes, and artifacts. However,
it’s very hard to work with any advanced malware using only static
analysis.

Dynamic Analysis: examine malware while executing it on hardware


or, more frequently, in a sandbox, and then try to figure out its
functionality. The great advantage here is that the virtual machine
allows you to research malicious files completely safe for your
system.

Interactive analysis is an advanced form of dynamic analysis.


Researchers can control the process, influence the simulation in
real-time, make changes right after getting the updates from the
sample. Simulation of actions is as realistic as possible — researchers
can interact with pop-ups or change OS configuration on the fly.

09

Benefits of
interactive malware
analysis
Interactive analysis has several other

advantages:

It allows interacting with a malware sample directly

It allows running several interdependent parts of the malware in one task

to increase analysis quality

It allows for acquiring data faster

It reduces the required specification of the researcher

It enables researchers to change operating system configuration based

on malware behavior and re-run tasks much faster

Furthermore, there are situations where other analysis types just aren’t

sufficient. At least, unless the researcher is extremely experienced, and

even then other analysis types would take way too long in comparison.

For instance, some malware samples will only execute if certain conditions

are met.

One example is banking Trojans that may activate if a user visits a

particular online banking website. Only then the trojan will try to steal and

send information to the Command & Control server. Therefore, thanks to

interactivity, analysts can collect more IOCs.

One example is banking Trojans that may activate if a user visits a


particular online banking website. Only then will the trojan try to steal and
send information to the Command & Control server. Therefore, thanks to
10
interactivity, analysts can collect more IOCs.

Additionally, some malware has kill switches in a form of files with specific
names or registry keys. Analysts can try to include them in a virtual
machine during analysis or check the language of the malicious document
during analysis, change the system locale, and re-run tasks. This will allow
the malware to work in full and give more IOCs.

Fully automated analysis programs may not know all execution scenarios.
So they miss important steps and don’t paint the whole picture.

Additionally, some samples within a malware family may have a unique


execution process. Launching a separate automated analysis because of a
single unique sample may not be viable. It’s just too much work, time, and
money.

Interactive analysis, on the other hand, allows testing multiple execution


variants by, well, interacting with the execution process. This enables
analysts to get data fast. And does not require a lot of experience from the
researchers since the process is intuitive.

11

Use cases of deep


analysis with
ANY.RUN
Malware wants to make sure that it’s dealing with a real person, not an
automatic virtual machine. To reach this goal, malicious programs use
various techniques, for example, they launch only after a user is engaged,
they require to take some actions – to drag a mouse, close a file, or tap
buttons. ANY.RUN gives plenty of tools and features to execute such
malware anyway.

Reboot support case


Some malware families enter the active phase only after a system reboot
to avoid detection from automated sandboxes. This ANY.RUN’s feature is
not only helpful when it comes to detecting sneaky malware, but also
allows analysts to observe malware behavior after the operating system’s
reboot and collect additional IOCs.

To illustrate this malware technique, let’s investigate one example.

In Nanocore’s sample, the loader makes a lot of steps to execute the


downloaded payload, maintain its persistence, and access the infected
system.

The downloaded executable file adds itself to the OS startup folder and
stops its execution. This simple trick is heavily used and works just fine.

In addition, the malware adds itself, not directly, but through a text file in
12

a startup folder, with a path to a malicious executable file. This is done

to avoid detection by AntiVirus (AV) software.

In the figure below, we can see that in the initial system that runs all
processes’ activities stopped, after the y6s2gl.exe process is added into

a startup. Now we reboot the system during analysis to take a look at


malware activities. As you may notice, after the system reboot malware
successfully executes and is detected as Nanocore.

Phishing case
Phishing’s goal is to get access to confidential data, such as personal
information, logins, passwords, etc. It is often manifested as an email on
behalf of different services with links to fake sites. If you follow one of them,
you can see a graphical image of an original site. Pay attention to domain
names or IP addresses, you may find spelling mistakes, it is a distinguishing
feature of a scam.

If you think you’re dealing with an untrusted file or a link, the safe solution
can be in malware sandboxes. Analysts run a file or link in a virtual
environment and then watch it in action: what the suspicious file is going

to do. In the end, you get a report to identify malware.


13

ANY.RUN can pretend to be a real machine to deceive malware and make


it act. Owing to the interactivity of the service you can manage the
simulation and work with the virtual environment (such as dragging a
mouse, tapping keys, entering data, and monitoring traffic). Moreover, you
can set the parameters of the simulation.

The sandbox can work with various operating systems and browsers.
Sometimes phishing decoys look different in other browsers. With our
service, you can execute analysis with a broad range of opportunities.

Or there can be a different scenario. Every employee works with Google


Drive, Dropbox, or other file exchange services. They see a pdf, a document
with an image or text decoy. You click on a link and get an invitation to
download a file with a long name or extra underscores. Opening it can lead
to a malware installation, stealing sensitive information, or it can be a part
of a larger attack, for example, ransomware.
14

In the task with suspicious content, ANY.RUN opens a link and sees where
it follows, what files are downloaded.

First, you insert your login and password, then you are directed to the
original site. But all your data is already stolen.

The “Network” stream and “Connections” section gives you details about
where traffic has gone and what URL was opened. ANY.RUN intercepts the
packages with the stolen login and password.

Another sample with the network stream demonstrates how a Mass


Logger sends authorization information in plain text. Copy and paste
domain, login, password, and collect information about infected systems.

15

Malware case with fast detection


If an attack happens, malware analytics have to respond as quickly as
possible. Time is what matters the most here. And the first step to improve
security is to identify the malware fast.

Here is a task with fast detection and analysis. The Excel document from
this sample contains a malicious program. And it takes 28 seconds for
ANY.RUN to detect a Formbook.
16

Even by looking at the process tree, you can say that Formbook is in front

of you without waiting for tags. Malicious payload injects itself in system

processes from the hardcoded list and then spawns the child cmd.exe

process which deletes the initial payload.

After that trojan injects into the Explorer.exe process and starts its

malicious activity. In this case, Formbook is detected by Suricata IDS rules,

but it is also often detected by created files. And it’s helpful that the whole

analysis takes less than a minute.


17

Platform

for Education
ANY.RUN is a service for deep malware analysis, besides that, it is an
excellent platform for the education of junior staff. Several training
courses use the service in their programs. It’s a great opportunity to get
relevant and profound knowledge from experienced specialists with
modern tools.

For example, 3 malware analysis courses in the Dakota State University


integrate ANY.RUN into their programs: Advanced Malware, Malware
Analysis, and Intrusion Detection. These courses provide fundamental
knowledge of malware analysis, threat hunting, detection techniques,

and advanced practices used in malware analysis.

Zero 2 Automated, a training course is also teaching beginners and experts


in cybersecurity the basis and deep analysis based on the service.
Malware algorithms, evasion, all steps of reverse engineering, practical
analysis, and other topics are covered there.

ANY.RUN is convenient for learning: students can see the results of


analysis right away, how malware executes and it doesn’t require any
preparation. Just start the task and see the result.

The “Public tasks” window is the place where users share their
investigations. It helps to research samples and collect IOCs. A detailed
report will help you find the necessary information quickly and export it.
18

There is a convenient filter system in the public submissions by a hash,

a run type of analyzed object (URL or file), a verdict, extensions, specified


tags. In the unique context part, you can fill information about the sample’s
origin, hash type, domain type, IP address type, Mitre attack type, and
Suricata SID type. It is possible to configure components by one or several
parameters. You get an opportunity to use the service for Open-source
intelligence, OSINT. If you have a potentially infected IOC, you need to filter
it and find tasks with similar examples.
19

Final words
Malware is becoming more and more sophisticated and, unfortunately,
brand new samples are regularly introduced into the wild. Online security
and solid defense against cyber threats are more important today than it
ever was.

Thankfully, there is a new approach to malware analysis – fast results,


tamed advanced malware, not a complicated process of research, and
detailed reports. If you want to be a part of it, just join ANY.RUN
community. All basic functionality is free, so go ahead and enjoy
interactive analysis! You can also request a free demo version to level up
your experience on the service and check out all available features for
deep research.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy