SlideShare a Scribd company logo
www.SecurityXploded.com
Advanced Malware Analysis Training Series
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS" without
any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are
solely of the trainer’s only and nothing to do with the company or the organization in which
the trainer is currently working.
However in no circumstances neither the Trainer nor SecurityXploded is responsible for any
damage or loss caused due to use or misuse of the information presented here.
www.SecurityXploded.com
Acknowledgement
 Special thanks to Null community for their extended support and co-operation.
 Special thanks to ThoughtWorks for the beautiful venue.
 Thanks to all the trainers who have devoted their precious time and countless hours to make it
happen.
www.SecurityXploded.com
Advanced Malware Analysis Training
This presentation is part of our Advanced Malware Analysis Training program. Currently it
is delivered only during our local meets for FREE of cost.
For complete details of this course, visit our Security Training page.
www.SecurityXploded.com
Who am I?
Monnappa
 Member, SecurityXploded
 Info Security Investigator @ Cisco
 Reversing, Malware Analysis, Memory Forensics.
 Email: monnappa22@gmail.com
 Twitter: @monnappa22
 LinkedIn: http://www.linkedin.com/pub/monnappa-ka-grem-ceh/42/45a/1b8
www.SecurityXploded.com
Content
 Sandbox Overview
 Why Sandbox Analysis
 Sandbox Architecture
 Online Sandboxes
 Custom Sandbox (Sandbox.py)
 Sandbox.py working
 Sandbox.py report
 Demo 1&2 (Sandbox Analysis)
www.SecurityXploded.com
Sandbox Overview
 Execute malware in a controlled/monitored environment
 Monitors file system, registry, process and network activity
 Outputs the results in multiple formats
 Examples of Sandboxes
 Cuckoo Sandbox
 ThreatExpert
 Anubis
 CWSandbox
www.SecurityXploded.com
Why Sandbox Analysis?
To determine:
 The nature and purpose of the malware
 Interaction with the file system
 Interaction with the registry
 Interaction with the network
 To determine identifiable patterns
www.SecurityXploded.com
Sandbox Architecture
www.SecurityXploded.com
Controller
Reports ArtifactsPCAPS
Host Machine Analysis Machine (VM)
Reports
Launch
Sample
Samples
Submit
Monitoring tools
Online Sandbox –ThreatExpert results
www.SecurityXploded.com
Online Sandbox –CWSandbox results
www.SecurityXploded.com
Online Sandbox –Anubis results
www.SecurityXploded.com
Custom Sandbox – sandbox.py
 Automates static, dynamic and Memory analysis using open source tools
 Written in python
 Can be run in sandbox mode or internet mode
 In sandbox mode it can simulate internet services (this is the default mode)
 Allows you to set the timeout for the malware to run (default is 60 seconds)
 Stores final reports, pcaps, desktop screeshot , and malicious artifacts for later
analysis
www.SecurityXploded.com
Sandbox.py (working)
 Takes sample as input
 Performs static analysis
 Reverts VM to clean snapshot
 Starts the VM
 Transfers the malware to VM
 Runs the monitoring tools ( to monitor process, registry, file system, network
activity)
 Executes the malware for the specified time
www.SecurityXploded.com
Sandbox.py (working contd)
 Stops the monitoring tools
 Suspends the VM
 Acquires the memory image
 Performs memory analysis using Volatility framework
 Stores the results (Final reports, destkop screenshot, pcaps and malicious
artifacts for later analysis)
www.SecurityXploded.com
Sandbox.py Report
Static analysis results:
 File type (uses magic python module)
 Cryptographic hash (md5sum – uses hashlib python module)
 VirusTotal results (python script using VirusTotal’s public api)
 Determines packers used by malware (uses yara-python)
 Determines the capabilities of the malware like IRC, P2P etc etc (uses yara-python module)
www.SecurityXploded.com
Sandbox.py report
Dynamic analysis results:
 Determines File system activity
 Determines Process activity
 Determines Registry activity
 Monitor Network activity
 Displays DNS summary
 Shows TCP conversations
 Displays HTTP requests & HTTP request tree
www.SecurityXploded.com
Sandbox.py report
Memory analysis results:
 uses Volatility advanced memory forensics framework
 displays process, hidden process in memory
 displays network connections, terminated network connections
 displays listening sockets
 determines api hooks, code injection and embedded executable in memory
 displays DLL’s loaded by the process memory
 displays services in memory
 displays the registry keys (like run registry key)
www.SecurityXploded.com
www.SecurityXploded.com
All Training Demo Videos are available at
http://securityxploded.com/security-training-videos.php
www.SecurityXploded.com
Sandbox.py – Help option
The below screenshot shows the sandbox.py help option
www.SecurityXploded.com
Sandbox.py – Input
The below screenshot shows the sandbox.py taking sample as input to run it for 30 seconds
www.SecurityXploded.com
Sandbox.py – Static Analysis
The below screenshot shows the static analysis results after executing the sample
www.SecurityXploded.com
Sandbox.py – Dynamic Analysis
The below screenshot shows the dynamic analysis results after executing the sample
www.SecurityXploded.com
Sandbox.py – Network Activity
The below screenshot shows the network activity after executing the sample
www.SecurityXploded.com
Sandbox.py – Memory Analysis
The below screenshot shows the memory analysis results after executing the sample
Reference
www.SecurityXploded.com
Complete Reference Guide for Advanced Malware Analysis Training
[Include links for all the Demos & Tools]
Thank You !
www.SecurityXploded.com
www.SecurityXploded.com

More Related Content

PPTX
Reversing & malware analysis training part 1 lab setup guide
PPTX
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
PPTX
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
PPTX
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
PPTX
Advanced Malware Analysis Training Session 5 - Reversing Automation
PPTX
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
PPTX
Reversing & Malware Analysis Training Part 13 - Future Roadmap
PPTX
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Reversing & malware analysis training part 1 lab setup guide
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1

What's hot (20)

PPTX
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PPTX
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
PPTX
Reversing & malware analysis training part 2 introduction to windows internals
PPTX
Anti-Virus Evasion Techniques and Countermeasures
PPTX
Reversing & malware analysis training part 3 windows pe file format basics
PPTX
Primer on password security
PPTX
Anatomy of Exploit Kits
PPTX
Advanced malware analysis training session 7 malware memory forensics
PPTX
Application Virtualization
PPTX
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
PPTX
Advanced malware analysis training session8 introduction to android
PPTX
Advanced malwareanalysis training session2 botnet analysis part1
PPTX
Reversing malware analysis training part1 lab setup guide
PPTX
Reversing malware analysis training part11 exploit development advanced
PPTX
Reversing malware analysis trainingpart9 advanced malware analysis
PPTX
Reversing malware analysis training part7 unpackingupx
PPTX
Reversing malware analysis training part6 practical reversing
PPTX
Advanced malware analysis training session5 reversing automation
PPTX
Hunting Rootkit From the Dark Corners Of Memory
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Reversing & malware analysis training part 2 introduction to windows internals
Anti-Virus Evasion Techniques and Countermeasures
Reversing & malware analysis training part 3 windows pe file format basics
Primer on password security
Anatomy of Exploit Kits
Advanced malware analysis training session 7 malware memory forensics
Application Virtualization
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced malware analysis training session8 introduction to android
Advanced malwareanalysis training session2 botnet analysis part1
Reversing malware analysis training part1 lab setup guide
Reversing malware analysis training part11 exploit development advanced
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis training part7 unpackingupx
Reversing malware analysis training part6 practical reversing
Advanced malware analysis training session5 reversing automation
Hunting Rootkit From the Dark Corners Of Memory
Ad

Similar to Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis (20)

PPTX
Advanced malware analysis training session6 malware sandbox analysis
PPTX
Sandbox kiev
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PPTX
Basic malware analysis
PPTX
Basic malware analysis
PDF
Reversing & malware analysis training part 9 advanced malware analysis
PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
PDF
Sandbox vs manual analysis v2.1
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PDF
Reversing & malware analysis training part 12 rootkit analysis
PDF
Modern malware and threats
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
PDF
Malware Sandbox free malware sandbox.pdf
PPTX
Automating malware analysis
PPTX
Basic Dynamic Analysis of Malware
PDF
Project in malware analysis:C2C
PPTX
Malware 101 by saurabh chaudhary
PDF
CH1- Introduction to malware analysis-v2.pdf
PPTX
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
PPTX
Automating Malware Analysis
Advanced malware analysis training session6 malware sandbox analysis
Sandbox kiev
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Basic malware analysis
Basic malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Sandbox vs manual analysis v2.1
Sandbox detection: leak, abuse, test - Hacktivity 2015
Reversing & malware analysis training part 12 rootkit analysis
Modern malware and threats
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Sandbox free malware sandbox.pdf
Automating malware analysis
Basic Dynamic Analysis of Malware
Project in malware analysis:C2C
Malware 101 by saurabh chaudhary
CH1- Introduction to malware analysis-v2.pdf
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Automating Malware Analysis
Ad

More from securityxploded (20)

PPTX
Fingerprinting healthcare institutions
PDF
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
PDF
Buffer Overflow Attacks
PPTX
Malicious Client Detection Using Machine Learning
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PDF
Linux Malware Analysis using Limon Sandbox
PPT
Introduction to SMPC
PPTX
Breaking into hospitals
PPTX
Bluetooth [in]security
PPTX
Reverse Engineering Malware
PPTX
DLL Preloading Attack
PPTX
Partial Homomorphic Encryption
PPTX
Return Address – The Silver Bullet
PPTX
Defeating public exploit protections (EMET v5.2 and more)
PPTX
Hunting Ghost RAT Using Memory Forensics
PPTX
Malicious Url Detection Using Machine Learning
PPTX
MalwareNet Project
PPTX
Reversing and Decrypting the Communications of APT Malware (Etumbot)
PPTX
Dissecting BetaBot
PPTX
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
Fingerprinting healthcare institutions
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Buffer Overflow Attacks
Malicious Client Detection Using Machine Learning
Understanding CryptoLocker (Ransomware) with a Case Study
Linux Malware Analysis using Limon Sandbox
Introduction to SMPC
Breaking into hospitals
Bluetooth [in]security
Reverse Engineering Malware
DLL Preloading Attack
Partial Homomorphic Encryption
Return Address – The Silver Bullet
Defeating public exploit protections (EMET v5.2 and more)
Hunting Ghost RAT Using Memory Forensics
Malicious Url Detection Using Machine Learning
MalwareNet Project
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Dissecting BetaBot
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis

  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the Trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to Null community for their extended support and co-operation.  Special thanks to ThoughtWorks for the beautiful venue.  Thanks to all the trainers who have devoted their precious time and countless hours to make it happen. www.SecurityXploded.com
  • 4. Advanced Malware Analysis Training This presentation is part of our Advanced Malware Analysis Training program. Currently it is delivered only during our local meets for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who am I? Monnappa  Member, SecurityXploded  Info Security Investigator @ Cisco  Reversing, Malware Analysis, Memory Forensics.  Email: monnappa22@gmail.com  Twitter: @monnappa22  LinkedIn: http://www.linkedin.com/pub/monnappa-ka-grem-ceh/42/45a/1b8 www.SecurityXploded.com
  • 6. Content  Sandbox Overview  Why Sandbox Analysis  Sandbox Architecture  Online Sandboxes  Custom Sandbox (Sandbox.py)  Sandbox.py working  Sandbox.py report  Demo 1&2 (Sandbox Analysis) www.SecurityXploded.com
  • 7. Sandbox Overview  Execute malware in a controlled/monitored environment  Monitors file system, registry, process and network activity  Outputs the results in multiple formats  Examples of Sandboxes  Cuckoo Sandbox  ThreatExpert  Anubis  CWSandbox www.SecurityXploded.com
  • 8. Why Sandbox Analysis? To determine:  The nature and purpose of the malware  Interaction with the file system  Interaction with the registry  Interaction with the network  To determine identifiable patterns www.SecurityXploded.com
  • 9. Sandbox Architecture www.SecurityXploded.com Controller Reports ArtifactsPCAPS Host Machine Analysis Machine (VM) Reports Launch Sample Samples Submit Monitoring tools
  • 10. Online Sandbox –ThreatExpert results www.SecurityXploded.com
  • 11. Online Sandbox –CWSandbox results www.SecurityXploded.com
  • 12. Online Sandbox –Anubis results www.SecurityXploded.com
  • 13. Custom Sandbox – sandbox.py  Automates static, dynamic and Memory analysis using open source tools  Written in python  Can be run in sandbox mode or internet mode  In sandbox mode it can simulate internet services (this is the default mode)  Allows you to set the timeout for the malware to run (default is 60 seconds)  Stores final reports, pcaps, desktop screeshot , and malicious artifacts for later analysis www.SecurityXploded.com
  • 14. Sandbox.py (working)  Takes sample as input  Performs static analysis  Reverts VM to clean snapshot  Starts the VM  Transfers the malware to VM  Runs the monitoring tools ( to monitor process, registry, file system, network activity)  Executes the malware for the specified time www.SecurityXploded.com
  • 15. Sandbox.py (working contd)  Stops the monitoring tools  Suspends the VM  Acquires the memory image  Performs memory analysis using Volatility framework  Stores the results (Final reports, destkop screenshot, pcaps and malicious artifacts for later analysis) www.SecurityXploded.com
  • 16. Sandbox.py Report Static analysis results:  File type (uses magic python module)  Cryptographic hash (md5sum – uses hashlib python module)  VirusTotal results (python script using VirusTotal’s public api)  Determines packers used by malware (uses yara-python)  Determines the capabilities of the malware like IRC, P2P etc etc (uses yara-python module) www.SecurityXploded.com
  • 17. Sandbox.py report Dynamic analysis results:  Determines File system activity  Determines Process activity  Determines Registry activity  Monitor Network activity  Displays DNS summary  Shows TCP conversations  Displays HTTP requests & HTTP request tree www.SecurityXploded.com
  • 18. Sandbox.py report Memory analysis results:  uses Volatility advanced memory forensics framework  displays process, hidden process in memory  displays network connections, terminated network connections  displays listening sockets  determines api hooks, code injection and embedded executable in memory  displays DLL’s loaded by the process memory  displays services in memory  displays the registry keys (like run registry key) www.SecurityXploded.com
  • 19. www.SecurityXploded.com All Training Demo Videos are available at http://securityxploded.com/security-training-videos.php
  • 20. www.SecurityXploded.com Sandbox.py – Help option The below screenshot shows the sandbox.py help option
  • 21. www.SecurityXploded.com Sandbox.py – Input The below screenshot shows the sandbox.py taking sample as input to run it for 30 seconds
  • 22. www.SecurityXploded.com Sandbox.py – Static Analysis The below screenshot shows the static analysis results after executing the sample
  • 23. www.SecurityXploded.com Sandbox.py – Dynamic Analysis The below screenshot shows the dynamic analysis results after executing the sample
  • 24. www.SecurityXploded.com Sandbox.py – Network Activity The below screenshot shows the network activity after executing the sample
  • 25. www.SecurityXploded.com Sandbox.py – Memory Analysis The below screenshot shows the memory analysis results after executing the sample
  • 26. Reference www.SecurityXploded.com Complete Reference Guide for Advanced Malware Analysis Training [Include links for all the Demos & Tools]