Homeland Security
National Cybersecurity and Communications Integration Center
Intelligence Driven Malware Analysis (IDMA) Malicious Profiling 14 - - PowerPoint PPT Presentation
Intelligence Driven Malware Analysis (IDMA) Malicious Profiling 14 January 2015 Homeland National Cybersecurity and Communications Integration Center Security whoami Cyber Threat Analyst at Northrop Grumman Performed wide range of
Homeland Security
National Cybersecurity and Communications Integration Center
Homeland Security
Office of Cybersecurity and Communications
2
Homeland Security
Office of Cybersecurity and Communications
3
Homeland Security
Office of Cybersecurity and Communications
4
Homeland Security
Office of Cybersecurity and Communications
5
Homeland Security
Office of Cybersecurity and Communications
6
Homeland Security
Office of Cybersecurity and Communications
IP (net flow)
services
locations
methods
change, delete)
7
Homeland Security
Office of Cybersecurity and Communications
8
Homeland Security
Office of Cybersecurity and Communications
9
Homeland Security
Office of Cybersecurity and Communications
Modular analysis Profiles can be individually or collectively applied to the diamond model to increase efficiency and focus analysis.
The basic concept of malicious profiling leverages existing malware analysis techniques applied with critical thinking and intelligence analysis skills.
10
Homeland Security
Office of Cybersecurity and Communications
11
Homeland Security
Office of Cybersecurity and Communications
12
Homeland Security
Office of Cybersecurity and Communications
13
Homeland Security
Office of Cybersecurity and Communications
14
Homeland Security
Office of Cybersecurity and Communications
TI-OV Adversary Infrastructure Capabilities Victim Behavioral
Anti-forensic techniques Sample signed with two digital certificates
Host Based
Public facing server URL Designed to run on Windows XP
Network Based
Digital certificate domains Malicious domain hardcoded Hosting IP address
Ephemeral
Compile time Sample hash Detection Time
(Zeltser, 2015)
15
Homeland Security
Office of Cybersecurity and Communications
16
Homeland Security
Office of Cybersecurity and Communications
17
Homeland Security
Office of Cybersecurity and Communications
18
Homeland Security
Office of Cybersecurity and Communications
indicators
effectiveness of incident response and threat intelligence
indicators
reporting
four components
to be compartmentalized & segregated
be derived without full scale reversing
effectiveness in incident response
19
Homeland Security
Office of Cybersecurity and Communications
20