REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, - - PowerPoint PPT Presentation

renigma a tool to analyze malware
SMART_READER_LITE
LIVE PREVIEW

REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, - - PowerPoint PPT Presentation

REnigma: A Tool to Analyze Malware April 23, 2018 Julian Grizzard, Co-founder Deterministic Security, LLC James (Jim) Stevens, Co-founder Spin-off of The Johns Hopkins University Applied Physics Laboratory Need: Hard to Keep Networks Secure!


slide-1
SLIDE 1

REnigma: A Tool to Analyze Malware

April 23, 2018

Julian Grizzard, Co-founder James (Jim) Stevens, Co-founder Deterministic Security, LLC Spin-off of The Johns Hopkins University Applied Physics Laboratory

slide-2
SLIDE 2

Need: Hard to Keep Networks Secure!

Network Defense End-Point Defense

Attempt to stop attacks before they reach the end points Attempt to stop attacks that bypass network defenses

slide-3
SLIDE 3

Need: Hard to Keep Networks Secure!

Network Defense End-Point Defense

Attempt to stop attacks before they reach the end points Attempt to stop attacks that bypass network defenses

  • “PyeongChang 2018 Winter Olympics

Opening Ceremony Disrupted by Malware Attacks”

  • “Equifax Hack Exposes Personal Info of 143

Million US Consumers”

slide-4
SLIDE 4

REnigma focuses on threats that can make it through all automated defenses

Threat and Incident Response

Threat and Incident Response Teams

Incident Response Teams

  • Recover from attacks that bypass

all automated defenses Threat Teams

  • Discover new threats and update

defenses to block them

slide-5
SLIDE 5

DHS-sponsored survey that includes Fortune 100, Fortune 500, S&P 500, Global 1000, and Global 2000 organizations (rounded)

37% 38% 11% 10% 2% 1%

62% of respondents dedicate full-time staff to malware analysis

slide-6
SLIDE 6

18% 28% 37% 13% 4%

DHS-sponsored survey that includes Fortune 100, Fortune 500, S&P 500, Global 1000, and Global 2000 organizations (rounded)

Highly skilled analyst (costly) requires hours, days, or sometimes weeks to analyze one sample

slide-7
SLIDE 7

Approach - Overview

Network Defense Tools End-Point Defense Tools Search Logs Quarantine/Cleanup Threat Knowledge External Communities Alerts from Other Tools Abuse Box (Users) Security Incident Hunt Team

Inputs

REnigma

Outputs

Analyze malware and block variants

  • f the threat
slide-8
SLIDE 8

Approach - Overview

Network Defense Tools End-Point Defense Tools Search Logs Quarantine/Cleanup Threat Knowledge External Communities Alerts from Other Tools Abuse Box (Users) Security Incident Hunt Team

Inputs

REnigma

Outputs

Analyze malware and block variants

  • f the threat
slide-9
SLIDE 9

Approach - Overview

Network Defense Tools End-Point Defense Tools Search Logs Quarantine/Cleanup Threat Knowledge External Communities Alerts from Other Tools Abuse Box (Users) Security Incident Hunt Team

Inputs

REnigma

Outputs

Analyze malware and block variants

  • f the threat
slide-10
SLIDE 10

Approach - Analysis Detail

1. User uploads suspicious files or URLs to REnigma 2. REnigma records execution of sample in virtual machine (VM)

○ Interact with VM while recording

3. Analyst performs automated and/or semi-automated analysis of replay

○ Instruction-level analysis ○ “Rewind” to previous points

Output:

  • Deep understanding of threat
  • Indicators of Compromise (IOCs)
slide-11
SLIDE 11

Approach - Analysis Detail

1. User uploads suspicious files or URLs to REnigma 2. REnigma records execution of sample in virtual machine (VM)

○ Interact with VM while recording

3. Analyst performs automated and/or semi-automated analysis of replay

○ Instruction-level analysis ○ “Rewind” to previous points

Output:

  • Deep understanding of threat
  • Indicators of Compromise (IOCs)
slide-12
SLIDE 12

Benefits

  • Record and replay functionality

solves critical challenges in analysis

  • Example: Easily “rewind” to

point before cleanup Quickly Understand New Threats

  • Export data in standard formats for

analysis with existing tools

  • Example tools: IDA Pro,

Wireshark, Volatility Leverage Existing Analyst Skills

  • Analyst often has only “one shot” to

capture sample (e.g., website gone)

  • Recording can capture

sample before it is gone Solve the “One Shot” Problem

  • Create online account for

cloud-based service

  • Onsite deployment

possible Easy and Safe to Deploy

slide-13
SLIDE 13

Benefits - Feedback from Users

  • Confidence in safe environment for analysis

○ Do not have to worry about setting up and securing a custom setup ○ Not detonating samples on corporate network

  • Deeper knowledge of attacks that other tools don’t provide

○ Often receive alerts that something is bad but don’t know why ○ REnigma provides independent, fast, and deep understanding of attacks

  • Actionable information

○ Results from REnigma used immediately to block threats ○ Able to obtain results more quickly than other tools

slide-14
SLIDE 14

REnigma easy to configure and leaves nowhere to hide

Competition

REnigma designed to provide answers within minutes REnigma records 100% of activity to dig in deep

Static Analysis

  • Requires expensive and highly skilled analyst
  • Takes weeks to analyze samples
  • Example product: IDA Pro

Traditional Commercial Sandbox

  • Limited to coarse-grained analysis
  • Do not support replay
  • Example product: Joe’s Sandbox (well known)

Custom System (i.e., with open source)

  • Requires costly expert for setup/maintenance
  • Easy for attackers to study and evade
  • Example tool: custom virtual machine
slide-15
SLIDE 15

REnigma Summary

  • Powerful capability to quickly analyze threats that bypass your defenses
  • Takes minutes rather than weeks of analysis
  • Results gained from REnigma help keep your network safe
slide-16
SLIDE 16

DTRSEC Services

  • REnigma for Enterprise IT

○ 4 month trial period ○ Host on site or in DTRSEC Cloud ○ Options for improved performance and reliability

  • Malware Analysis Training

○ Operating systems and computer architecture basics ○ Study recordings of real malware in action ○ Learn advanced malware analysis with REnigma

Contact us for more information

Julian Grizzard, Co-Founder Julian@dtrsec.com Deterministic Security, LLC Jim Stevens, Co-Founder Jim@dtrsec.com Deterministic Security, LLC