dirtbox a x86/Windows dirtbox, a x86/Windows Emulator
Georg Wicherski Virus Analyst, Global Research and Analysis Team
dirtbox a x86/Windows dirtbox, a x86/Windows Emulator Georg - - PowerPoint PPT Presentation
dirtbox a x86/Windows dirtbox, a x86/Windows Emulator Georg Wicherski Virus Analyst, Global Research and Analysis Team BlackHat USA, 2010-07-29 Motivation & System Overview Motivation & System Overview Why not just use CWSandbox,
Georg Wicherski Virus Analyst, Global Research and Analysis Team
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
Epilogue is always the same Epilogue is always the same Uses sequence push ecx / ret to return to caller The ecx register belongs to the called function by definition, so it is d fi d API t undefinde upon API return The ecx value can be predicted because it will point to the API‘s ret
There are some funny but trivially detected workarounds Could be used for generic anti-emulation detection (use of Could be used for generic anti emulation detection (use of undefined registers after SEH protected API calls)
2010-07-29 BlackHat USA 2010, Las Vegas
Other libraries wrap around kernel32 which Ring 0 malware.exe ntdll wraps around ntdll
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
Virtual
Physical
Logical
2010-07-29 BlackHat USA 2010, Las Vegas
Virtual
Physical
Logical
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
GetPC
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas
2010-07-29 BlackHat USA 2010, Las Vegas