SlideShare a Scribd company logo
Anatomy of File Analysis and Decomposition Engine
Anatomy of File Analysis and Decomposition Engine
Anatomy of File Analysis and Decomposition Engine
• Collect as much information as possible
  from files/binary objects
  – Other contained files/objects
  – Metadata, e.g. mobile app permissions,
    geolocation, IP addresses, domains, etc.
• Strip protection layers for additional
  analysis
• Do it really, really fast
• Do it at scale
•   Forensics
•   Anti-Virus
•   Threat Intelligence
•   ...
Anatomy of File Analysis and Decomposition Engine
• Files can be
  – Packed
  – Obfuscated
  – Encrypted
  – Broken
• Large amounts of data to process
• Speed
Anatomy of File Analysis and Decomposition Engine
•   Consolidating metadata and files/objects
•   Scheduling
•   Reporting
•   Communication
METADATA



FILES   ENGINE



                 FILES
• Preprocessing
  – Identification
  – Initial analysis
• Analysis
  – Unpacking
  – Validation
• Post processing
  – Consolidating metadata
MODULES
 SCHEDULER

                                           VALIDATION



IDENTIFICATION        ANALYSIS             UNPACKING



                                               ...




                 REPORT, METADATA, FILES
• Speed
• Security
• We can emulate
Anatomy of File Analysis and Decomposition Engine
• Various identification engines
  – Signature based
  – Heuristics
  – ...
• Problems
• Signatures
• Various complexity
  – Simple (e.g. PEiD)
     • Simple byte and wildcard matching, hash matching
     • 12 ?? 56 ?8 9?
  – Medium (e.g. TitanMist)
     • Small Regex like subset
  – High (e.g. TLang)
     • Almost full fledged programming language
• Other
Anatomy of File Analysis and Decomposition Engine
• Some parts depend on identification
• Dedicated analysis modules
• Internal/external modules
•   Unpacking
•   Validation
•   Collecting metadata
•   Repairing broken files
Anatomy of File Analysis and Decomposition Engine

More Related Content

PPTX
Archivematica integration handshaking towards comprehensive digital preserva...
PDF
Hierarchical DIP upload from Archivematica to AtoM
PDF
Personal Digital Archiving 2015 - NYU - Workshop
PPTX
Interoperability in Digital Libraries
PDF
Analysis of (unknown) file formats
PPT
Digital detective game
PPT
Network forensics1
Archivematica integration handshaking towards comprehensive digital preserva...
Hierarchical DIP upload from Archivematica to AtoM
Personal Digital Archiving 2015 - NYU - Workshop
Interoperability in Digital Libraries
Analysis of (unknown) file formats
Digital detective game
Network forensics1

Viewers also liked (9)

PPTX
Network forensics and investigating logs
PPTX
Network Forensics Intro
PPTX
Activity 6 home project - ppt presentation sample
PDF
Network Forensics
PPT
DETECTIVE ELEMENTS
PDF
Elements of the Detective Story
PPTX
Digital forensics
PPTX
Computer forensics powerpoint presentation
PPTX
Computer forensics ppt
Network forensics and investigating logs
Network Forensics Intro
Activity 6 home project - ppt presentation sample
Network Forensics
DETECTIVE ELEMENTS
Elements of the Detective Story
Digital forensics
Computer forensics powerpoint presentation
Computer forensics ppt
Ad

Similar to Anatomy of File Analysis and Decomposition Engine (20)

PPTX
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
PDF
Stuxnet redux. malware attribution & lessons learned
PPTX
Advanced malware analysis training session5 reversing automation
PDF
VxClass for Incident Response
PPTX
Advanced Malware Analysis Training Session 5 - Reversing Automation
PPTX
Building next gen malware behavioural analysis environment
PDF
Online performance modeling and analysis of message-passing parallel applicat...
PDF
Inbot10 vxclass
PDF
Malware Analysis -an overview by PP Singh
PDF
'Malware Analysis' by PP Singh
PDF
INFOSEC LANDSCAPE AND RESEARCH TRENDS
PPTX
Reverse Engineering Malware - A Practical Guide
PPT
Basics of Digital Forensics, techniques and tools
PPT
DigitalForensicDigitalForensicDigitalForensic
PPT
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
PPTX
Malware analysis as a hobby (Owasp Göteborg)
PPTX
Malware Analysis as a Hobby - 44CON 2012
PPTX
Malware Analysis as a Hobby
PPTX
DigitalForensics foundation and investigation tools
PPT
DigitalForensics.ppt
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
Stuxnet redux. malware attribution & lessons learned
Advanced malware analysis training session5 reversing automation
VxClass for Incident Response
Advanced Malware Analysis Training Session 5 - Reversing Automation
Building next gen malware behavioural analysis environment
Online performance modeling and analysis of message-passing parallel applicat...
Inbot10 vxclass
Malware Analysis -an overview by PP Singh
'Malware Analysis' by PP Singh
INFOSEC LANDSCAPE AND RESEARCH TRENDS
Reverse Engineering Malware - A Practical Guide
Basics of Digital Forensics, techniques and tools
DigitalForensicDigitalForensicDigitalForensic
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
Malware analysis as a hobby (Owasp Göteborg)
Malware Analysis as a Hobby - 44CON 2012
Malware Analysis as a Hobby
DigitalForensics foundation and investigation tools
DigitalForensics.ppt
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
cuic standard and advanced reporting.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
cuic standard and advanced reporting.pdf
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
Big Data Technologies - Introduction.pptx
Getting Started with Data Integration: FME Form 101
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
A comparative analysis of optical character recognition models for extracting...
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Anatomy of File Analysis and Decomposition Engine

  • 4. • Collect as much information as possible from files/binary objects – Other contained files/objects – Metadata, e.g. mobile app permissions, geolocation, IP addresses, domains, etc. • Strip protection layers for additional analysis • Do it really, really fast • Do it at scale
  • 5. Forensics • Anti-Virus • Threat Intelligence • ...
  • 7. • Files can be – Packed – Obfuscated – Encrypted – Broken • Large amounts of data to process • Speed
  • 9. Consolidating metadata and files/objects • Scheduling • Reporting • Communication
  • 10. METADATA FILES ENGINE FILES
  • 11. • Preprocessing – Identification – Initial analysis • Analysis – Unpacking – Validation • Post processing – Consolidating metadata
  • 12. MODULES SCHEDULER VALIDATION IDENTIFICATION ANALYSIS UNPACKING ... REPORT, METADATA, FILES
  • 13. • Speed • Security • We can emulate
  • 15. • Various identification engines – Signature based – Heuristics – ... • Problems
  • 16. • Signatures • Various complexity – Simple (e.g. PEiD) • Simple byte and wildcard matching, hash matching • 12 ?? 56 ?8 9? – Medium (e.g. TitanMist) • Small Regex like subset – High (e.g. TLang) • Almost full fledged programming language • Other
  • 18. • Some parts depend on identification • Dedicated analysis modules • Internal/external modules
  • 19. Unpacking • Validation • Collecting metadata • Repairing broken files