renigma a tool to analyze malware
play

REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, - PowerPoint PPT Presentation

REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, Co-founder Deterministic Security, LLC James (Jim) Stevens, Co-founder Spin-off of The Johns Hopkins University Applied Physics Laboratory Need: Hard to Keep Networks Secure!


  1. REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, Co-founder Deterministic Security, LLC James (Jim) Stevens, Co-founder Spin-off of The Johns Hopkins University Applied Physics Laboratory

  2. Need: Hard to Keep Networks Secure! Attempt to stop attacks before they reach the end points Network Defense Attempt to stop attacks that bypass network defenses End-Point Defense

  3. Need: Hard to Keep Networks Secure! Attempt to stop attacks before they reach the end points Network Defense Attempt to stop attacks that bypass network defenses End-Point Defense ● “PyeongChang 2018 Winter Olympics Opening Ceremony Disrupted by Malware Attacks” ● “Equifax Hack Exposes Personal Info of 143 Million US Consumers”

  4. Threat and Incident Response Incident Response Teams ● Recover from attacks that bypass all automated defenses Threat Teams Threat and Incident Response Teams ● Discover new threats and update defenses to block them REnigma focuses on threats that can make it through all automated defenses

  5. 37% 38% 11% 62% of respondents dedicate 10% full-time staff to malware analysis 2% 1% DHS-sponsored survey that includes Fortune 100, Fortune 500, S&P 500, Global 1000, and Global 2000 organizations (rounded)

  6. 18% 28% 37% 13% Highly skilled analyst (costly) requires hours, days, or sometimes 4% weeks to analyze one sample DHS-sponsored survey that includes Fortune 100, Fortune 500, S&P 500, Global 1000, and Global 2000 organizations (rounded)

  7. Approach - Overview Analyze malware Quarantine/Cleanup Alerts from Other Tools and block variants of the threat Network Defense Tools Abuse Box (Users) End-Point Defense Tools Search Logs Security Incident Threat Knowledge Hunt Team External Communities REnigma Inputs Outputs

  8. Approach - Overview Analyze malware Quarantine/Cleanup Alerts from Other Tools and block variants of the threat Network Defense Tools Abuse Box (Users) End-Point Defense Tools Search Logs Security Incident Threat Knowledge Hunt Team External Communities REnigma Inputs Outputs

  9. Approach - Overview Analyze malware Quarantine/Cleanup Alerts from Other Tools and block variants of the threat Network Defense Tools Abuse Box (Users) End-Point Defense Tools Search Logs Security Incident Threat Knowledge Hunt Team External Communities REnigma Inputs Outputs

  10. Approach - Analysis Detail 1. User uploads suspicious files or URLs to REnigma 2. REnigma records execution of sample in virtual machine (VM) ○ Interact with VM while recording 3. Analyst performs automated and/or semi-automated analysis of replay ○ Instruction-level analysis ○ “Rewind” to previous points Output: ● Deep understanding of threat ● Indicators of Compromise (IOCs)

  11. Approach - Analysis Detail 1. User uploads suspicious files or URLs to REnigma 2. REnigma records execution of sample in virtual machine (VM) ○ Interact with VM while recording 3. Analyst performs automated and/or semi-automated analysis of replay ○ Instruction-level analysis ○ “Rewind” to previous points Output: ● Deep understanding of threat ● Indicators of Compromise (IOCs)

  12. Benefits ● Record and replay functionality ● Analyst often has only “one shot” to solves critical challenges in analysis capture sample (e.g., website gone) ● Example: Easily “rewind” to ● Recording can capture point before cleanup sample before it is gone Quickly Understand New Threats Solve the “One Shot” Problem ● Export data in standard formats for ● Create online account for analysis with existing tools cloud-based service ● Example tools: IDA Pro, ● Onsite deployment Wireshark, Volatility possible Leverage Existing Analyst Skills Easy and Safe to Deploy

  13. Benefits - Feedback from Users ● Confidence in safe environment for analysis ○ Do not have to worry about setting up and securing a custom setup ○ Not detonating samples on corporate network ● Deeper knowledge of attacks that other tools don’t provide ○ Often receive alerts that something is bad but don’t know why ○ REnigma provides independent, fast, and deep understanding of attacks ● Actionable information ○ Results from REnigma used immediately to block threats ○ Able to obtain results more quickly than other tools

  14. Competition Static Analysis REnigma designed to provide ● Requires expensive and highly skilled analyst answers within minutes ● Takes weeks to analyze samples ● Example product: IDA Pro Traditional Commercial Sandbox REnigma records 100% of ● Limited to coarse-grained analysis activity to dig in deep ● Do not support replay ● Example product: Joe’s Sandbox (well known) Custom System (i.e., with open source) REnigma easy to configure ● Requires costly expert for setup/maintenance and leaves nowhere to hide ● Easy for attackers to study and evade ● Example tool: custom virtual machine

  15. REnigma Summary ● Powerful capability to quickly analyze threats that bypass your defenses ● Takes minutes rather than weeks of analysis ● Results gained from REnigma help keep your network safe

  16. DTRSEC Services ● REnigma for Enterprise IT ○ 4 month trial period ○ Host on site or in DTRSEC Cloud ○ Options for improved performance and reliability ● Malware Analysis Training ○ Operating systems and computer architecture basics ○ Study recordings of real malware in action ○ Learn advanced malware analysis with REnigma Contact us for more information Julian Grizzard, Co-Founder Jim Stevens, Co-Founder Julian@dtrsec.com Jim@dtrsec.com Deterministic Security, LLC Deterministic Security, LLC

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend