580 likes | 2.46k Views
Malware Analysis Using Cuckoo Sandbox. Digit Oktavianto 21 Juni 2014 http://digitoktavianto.web.id digit dot oktavianto at gmail dot com. About Me. Infosec Analyst @ Noosc Global Member Indonesian Honeynet Chapter Member OWASP Indonesian Chapter
E N D
Malware Analysis Using Cuckoo Sandbox Digit Oktavianto 21Juni 2014 http://digitoktavianto.web.id digit dot oktavianto at gmail dot com
About Me • Infosec Analyst @ Noosc Global • Member Indonesian Honeynet Chapter • Member OWASP Indonesian Chapter • Coordinator in System AdminstrationCloudIndonesia • Linux Activist (KPLI Jakarta)
Introduction to Malware Analysis • Malware : Any piece of code that has malicious intentions and /or performs a function that the user was not aware that it was going to do • Malware analysis : process of analyzing malware; how to analyze malware behavior; how to reverse the malware; how to disassemble the malware
Introduction to Malware Analysis (Cont’d..) • Benefits from malware analysis? • We can investigate how the malware works • We can predict what it is going to do with the victims • We will know how to mitigate this malware attack (quickly assess the threat) • We can prevent further malware action • We will understand threat management better • We can secure our environment
Basic Theory in Sandboxing What is Sandboxing? Sandboxing is a technique for isolating a programs (in this case, malware) by providing confined execution environments
Problems • Malwares in the wild are way too many • Manual analysis takes a lot of time • Static analysis requires strong skillsets • Need to deal with packed, polymorphic, self-modifying code • Performing dynamic analysis manually is a tedious work
Pros • Can automate the whole analysis process • Process high volumes of malwares • Usable by virtually anyone • Can tweak to do cool stuff • Automating is cool
Cons • Commercial solutions are very expensive • Some portions of the malware code could be not triggered • Environment could be detected • Without proper consumption of the results, it gets useless
Cuckoo Sandbox • • Rapid7’s Cuckoo Sandbox • – Allows sandboxed execution of malicious files • – Records file and registry changes and netwok connections. • – Integrates with common virtualization platforms • – It is possible to target custom OS and architecture • – Allows user interaction during execution • – Free
Cuckoo Sandbox What files can be processed by Cuckoo? - Generic Windows executables - DLL files - PDF documents - Microsoft Office documents - URLs - PHP scripts - Almost anything else
Cuckoo Sandbox Output • What is the output result from Cuckoo? • - Files being created, deleted and downloaded by the malware during its execution. • - Memory dumps of the malware processes. • - Network traffic trace in PCAP format. • Screenshots of Windows desktop taken during the execution of the malware. • Full memory dumps of the machines.
Cuckoo Sandbox Module • Analysis Packages • Machine Managers • Processing • Reporting • Signatures
Demo and Practice in Lab • Let’s Start Our Lab Practice
Thank You • FINISH • Q and A • Email : digit dot oktavianto at gmail dot com