one flaw over the cuckoo s nest
play

One FlAw over the Cuckoos Nest on , Ricardo J. Rodr guez I naki - PowerPoint PPT Presentation

One FlAw over the Cuckoos Nest on , Ricardo J. Rodr guez I naki Rodr guez-Gast All wrongs reversed inaki@sensepost.com, rjrodriguez@fi.upm.es @virtualminds es @RicardoJRdez SensePost Universidad Polit


  1. One FlAw over the Cuckoo’s Nest on † , Ricardo J. Rodr´ ıguez ‡ I˜ naki Rodr´ ıguez-Gast´ � All wrongs reversed inaki@sensepost.com, rjrodriguez@fi.upm.es @virtualminds es ※ @RicardoJRdez † SensePost ‡ Universidad Polit´ ecnica de Madrid London, UK Madrid, Spain 1 de Noviembre, 2013 No cON Name 2013 Barcelona (Espa˜ na)

  2. $ whoarewe $ whoarewe : command not found CLS member (2001) CISSP, CEH, GWAPT Ph.D. by UZ (2013) Security analyst @ SensePost Working for UPM Malware lover Trainee @ NcN, RootedCON, mlw.re staff HIP Trainee @ 44CON Speaker @ NcN, HackLU, . . . RootedCON, STIC CCN, HIP I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 2 / 39

  3. Agenda Outline Motivation 1 Previous Concepts 2 Cuckoo Sandbox Dynamic Binary Instrumentation: The Pin Framework On the Anti-VMs & Anti-Sandboxing Techniques 3 VM Detection Sandboxing detection Mixing Cuckoo Sandbox and Pin DBI 4 Sticking both Programs Introducing PinVMShield Case Study: the pafish tool 5 Related Work 6 Conclusions and Future Work 7 I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 3 / 39

  4. Motivation Outline Motivation 1 Previous Concepts 2 Cuckoo Sandbox Dynamic Binary Instrumentation: The Pin Framework On the Anti-VMs & Anti-Sandboxing Techniques 3 VM Detection Sandboxing detection Mixing Cuckoo Sandbox and Pin DBI 4 Sticking both Programs Introducing PinVMShield Case Study: the pafish tool 5 Related Work 6 Conclusions and Future Work 7 I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 4 / 39

  5. Motivation Motivation (I) Malware are increasing in number and complexity Targeted attacks also grown (specially industry and government espionage) How do we currently fight against malware? Firstly, to understand how a sample works (what is it doing?) Then, to figure out how it can be removed Lastly, to avoid future infections (can we detect it again?) I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 5 / 39

  6. Motivation Motivation (II) Figuring out what it is doing. . . Manual analysis Intensive Time-consuming I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 6 / 39

  7. Motivation Motivation (II) Figuring out what it is doing. . . Manual analysis Intensive Time-consuming Good if you are paid per working hour ¨ ⌣ Automatic analysis Just take a seat, and relax. . . Real problem here: automation of malware analysis tasks I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 6 / 39

  8. Motivation Motivation (II) Figuring out what it is doing. . . Manual analysis Intensive Time-consuming Good if you are paid per working hour ¨ ⌣ Automatic analysis Just take a seat, and relax. . . Real problem here: automation of malware analysis tasks Only manual analysis for weird (or interesting) samples I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 6 / 39

  9. Motivation Motivation (III) Sandbox Environments Computer resources are tightly controlled and monitored Current trending of malware analysis Commercial and free-license solutions Sandboxie JoeBox CWSandbox Cuckoo Sandbox PyBox Virtual Machine and Sandbox: a good combination I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 7 / 39

  10. Motivation Motivation (III) Sandbox Environments Computer resources are tightly controlled and monitored Current trending of malware analysis Commercial and free-license solutions Sandboxie JoeBox CWSandbox Cuckoo Sandbox PyBox Virtual Machine and Sandbox: a good combination Do malware samples detect VMs/sandbox environments? I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 7 / 39

  11. Motivation Motivation (III) Sandbox Environments Computer resources are tightly controlled and monitored Current trending of malware analysis Commercial and free-license solutions Sandboxie JoeBox CWSandbox Cuckoo Sandbox PyBox Virtual Machine and Sandbox: a good combination Do malware samples detect VMs/sandbox environments? Yes, they do. I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 7 / 39

  12. Motivation Motivation (IV) Can we avoid the detection of a VMs/sandbox environment? I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 8 / 39

  13. Motivation Motivation (IV) Can we avoid the detection of a VMs/sandbox environment? Yes, we can! (at least, we should try. . . ) I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 8 / 39

  14. Motivation Motivation (IV) Can we avoid the detection of a VMs/sandbox environment? Yes, we can! (at least, we should try. . . ) We’re gonna do it in a fancy way. . . using Dynamic Binary Instrumentation ¨ ⌣ Dynamic Binary Instrumentation (DBI) Analyse the runtime behaviour of a binary Executes arbitrary code during normal execution of a binary I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 8 / 39

  15. Motivation Motivation (V) Why DBI? Its advantages Binary instrumentation: advantages Programming language (totally) independent Machine-mode vision We can instrument proprietary software I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 9 / 39

  16. Motivation Motivation (V) Why DBI? Its advantages Binary instrumentation: advantages Programming language (totally) independent Machine-mode vision We can instrument proprietary software Dynamic Instrumentation: advantages No need to recompile/relink each time Allow to find on-the-fly code Dynamically generated code Allow to instrument a process in execution already ( attach ) I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 9 / 39

  17. Motivation Motivation (VI) Why DBI? Its disadvantages Main disadvantages Overhead (by the instrumentation during execution) ⇓ performance (analyst hopelessness!) Single execution path analysed I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 10 / 39

  18. Motivation Motivation (VII) Summary of contributions Our goal in this work Develop a Dynamic Binary Analysis (DBA) tool Integrated with Cuckoo Sandbox I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 11 / 39

  19. Motivation Motivation (VII) Summary of contributions Our goal in this work Develop a Dynamic Binary Analysis (DBA) tool Integrated with Cuckoo Sandbox Protects Cuckoo for being detected. . . I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 11 / 39

  20. Motivation Motivation (VII) Summary of contributions Our goal in this work Develop a Dynamic Binary Analysis (DBA) tool Integrated with Cuckoo Sandbox Protects Cuckoo for being detected. . . . . . and also for (some) VMs detection I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 11 / 39

  21. Previous Concepts Outline Motivation 1 Previous Concepts 2 Cuckoo Sandbox Dynamic Binary Instrumentation: The Pin Framework On the Anti-VMs & Anti-Sandboxing Techniques 3 VM Detection Sandboxing detection Mixing Cuckoo Sandbox and Pin DBI 4 Sticking both Programs Introducing PinVMShield Case Study: the pafish tool 5 Related Work 6 Conclusions and Future Work 7 I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 12 / 39

  22. Previous Concepts Cuckoo Sandbox Cuckoo Sandbox (I) What is Cuckoo Sandbox? Automated malware analysis tool Written in Python Reporting system (API calls, registry access, network activity) Extensible OpenSource I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 13 / 39

  23. Previous Concepts Cuckoo Sandbox Cuckoo Sandbox (II) API call analyzer.py packages \\.\PIPE\random string (exe.py) Results from the analysis agent.py Executes procces and injects cuckoomon.dll resultserver TCP socket (8000) Drop file Cuckoomon.dll (Random name) Sample.exe (Suspended) Sample.exe cuckoo.py submit.py web.py api.py I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 14 / 39

  24. Previous Concepts Dynamic Binary Instrumentation: The Pin Framework Dynamic Binary Instrumentation: The Pin Framework (I) http://www.pintools.org What is Pin? Framework designed by Intel Allows to build easy-to-use, portable, transparent and efficient instrumentation tools (DBA, or Pintools) Recall: instrumentation enables the execution of arbitrary code during run-time of a binary Extensive API for doing whatever you can imagine Used for things like: Instruction profiling Performance evaluation Bug detection And malware analysis (here we are ¨ ⌣ ) I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 15 / 39

  25. Previous Concepts Dynamic Binary Instrumentation: The Pin Framework Dynamic Binary Instrumentation: The Pin Framework (II) How does Pin work? I. Rodr´ ıguez-Gast´ on, R.J. Rodr´ ıguez One FlAw over the Cuckoo’s Nest 1 Nov’13 16 / 39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend