SlideShare a Scribd company logo
An Adversarial View of
SaaS Sandboxes
Jason Trost
Aaron Shelmire
Jan 16th 2016
Whois Jason
Jason Trost
•VP of Threat Research @ ThreatStream
•Previously at Sandia, DoD, Booz Allen, Endgame Inc.
•Background in Big Data Analytics, Security Research, Honeypots, and
Machine Learning
Whois Aaron
Aaron Shelmire
•Senior Threat Researcher @ ThreatStream
•Previously at CERT, Secure Works CTU-SO, CMU
•Background in Incident Response, Forensics, Security Research
• Advanced Malware Detects Sandboxes!
• Does it?
• Threat Intelligence Feeds
• AV is Dead!
• You’re going to tip off the adversary!!!
• Everyone’s going to know I’m compromised
Motivation
Experiment
• Created Sensors with unique CampaignIDs
• Encoded execution time and CampaignIDs in domain names
• Tornado HTTP app and Bind DNS servers
• Submitted unique samples to 29 free online Sandboxes
• Submitted unique domains to ~50 domain/URL Reputation engines
• Watched traffic roll in
Sandboxes Tested
Avira Comodo Instant Malware Analysis Comodo Valkyrie
F-Secure Online Analysis Joe Sandbox – Private File-analyzer.net
Malwr.com NSI Payload Security
ThreatExpert TotalHash ViCheck
Cloud.vmray.com Ether.gtisc.gatech.edu Threat track
Anubic.iseclab.com Metascan-online Eureka-cyber-ta.org
Microsoft portal Online.drweb.com uploadMalware
VirusTotal Virusscan.jotti.org wepawet
Virscan ViCheck ThreatStream’s internal sandbox
Domain/URL Reputation Engines Tested
app.webinspector.com malwaredomainlist.com senderscore.org trustedsource.org
avgthreatlabs.com mxtoolbox.com/blacklists.aspx siteadvisor.com/sites unmaskparasites.com
Bluecoat Web Pulse Passive Total sitecheck.sucuri.net URLVoid
brightcloud.com Phishtank.com spam404.com urlblacklist.com
Domain tools query Quttera spamhaus URLQuery
dshield.org quttera.com Sucuri Sitecheck Virus Total URL query
Fortiguard iprep reclassify.wrs.trendmicro.com SURBL VirusTotal URL domain/IP search
Google Safe Browsing reputationauthority.org Threat Log vurl.mysteryfcm.co.uk
Hosts-file.net safeweb.norton.com ThreatStream Web of Trust
isithacked.com Scumware.org TotalHash wepawet.iseclab.org
isitphishing.org senderbase.org trafficlight.bitdefender.com zulu.zscaler.com
Our Sensor – v1
Enumerate Host
Sockets Based Comms
Create Run Key
Delete Run Key
Exit Process
NO REMOTE ACCESS
CAPABILITY
APT TTP OMG!
vpnlogin-ithelpdesk.com
Filenames:
anyconnect-win-4.1.04011-k9.exe
vpnagent.exe
svchost.exe
svch0st.exe
lsass.exe
…
Sensor C2 – HTTP POST
Exfil HTTP POST
zlib compression
base64 encoded
Worked pretty well, but…
Sensor – v2 DNS Covert Channel C2
Some Sandboxes block TCP conns
Most allow DNS unmodified
zlib compression
hex encode
split data into chunks
multiple DNS A requests
Malware Detects Sandboxes
Sandbox detection features ver. 1
• System Services Lists
• Processes – VBoxService(1), vmtools (8)
• MAC address
• VMware, Inc. (55), Cadmus Computer Systems (40), ASUSTek COMPUTER INC. (23)
• Bios
• VMware (50), Bochs(34), ASUS(23), Google(8), Qemu(8)
• Disk Size
• 19.99GB (52), 25GB (37), 120GB (28), 50GB (20), 39GB (20)
• RAM
• 1GB (92), 1.5GB (18), 512MB (10)
• Was the EXE renamed?
• sample.exe, malware.exe, ${md5}.exe
Really Detecting Virtual Machines
• System Services Lists
• Processes – VBoxService(1), vmtools (8)
• MAC address
• VMware, Inc. (55), Cadmus Computer Systems (40), ASUSTek COMPUTER INC. (23)
• Bios
• VMware (50), Bochs(34), ASUS(23), Google(8), Qemu(8)
• Disk Size
• 19.99GB (52), 25GB (37), 120GB (28), 50GB (20), 39GB (20)
• RAM
• 1GB (92), 1.5GB (18), 512MB (10)
• Was the EXE renamed?
• sample.exe, malware.exe, ${md5}.exe
Sandbox Detection Techniques – Not
Implemented
• User Engagement
• Dialog box, Double Click. Doc Scroll
• Slow Mouse, Fast Sandbox
• Execution after reboot
• Pretty sure these would work
• Require User engagement /
Suspicion
Sandbox detection features ver. 3
• Wanted to try some new checks…
• Uptime – Malware checks for over 12 minutes?
• Is Sleep patched?
• Is the Security Information Descriptor valid ?
• Really checking if AV is emulating the process
• What Group is the user in?
Sandbox detection features ver. 3
Uptime Is Sleep Patched? ValidSid Group
~60 minutes No Yes Administrators
~5 minutes No Yes Administrators
~2 minutes No Yes Administrators
~20 minutes No Yes Administrators
38 hosts w/ HTTP check in, only 4 valid check ins
Sandbox Detection Techniques -- Way too
Advanced!!!!
• Many companies, but only a few virtual machines used!
• Same usernames
• Same hostnames
• Same disk size
• Same CPU count
•And then…
…just check the process name
• artifact.exe
• wbOxyeRLl6z7Jiq.exe
• sampel.exe
• 905DFEBA7A75DE9C6BF261CD5A076A5C5CB5FC1F.exe
• samp1e_9ac36e185072270b0745ea0d68085dd9.exe
GetModuleFileNameEx(hProcess, 0, lpBuff, MAX_PATH);
if (lpBuff != lpszMyName) ExitProcess();
So we had some other questions…
• AV?
• Tipping off the adversary?
• Threat Intel Feeds?
AV is Dead!
• Is it?
What did AV think of our sensor?
• At first…
Eventually…
• VirusTotal: 6 Samples
• Detection ranges from 8/57 to 30/57
• A lot of Trojan Zusy and Trojan Graftor
• More malicious as time went on
3rd gen sensor…
• Removed Sandbox accuracy checks
• Run key that was added, then removed
• Touch and Delete a file
• Large amount of host profiling
• Much more reasonable scoring
• Accuracy is worse than before!
Sharing?
• Yup, Lots
• Samples shared
• Evidence of new executions seen from different origins
• Domain names shared (or scraped)
• Previous execution’s domains resolved later by other orgs,
different nameservers
• Some domains appear on threat intel lists
• Many orgs are trivially identified as security
companies
• Every major AV company is represented in our DNS logs
• Several Security Product Companies
2nd Submission
DNS Sensor
1st Submission
Monday
Morning
3rd Submission
Sleep Check
Tipping off the Adversary
Check In Activity
27
Trend Micro +
Home Hosts
Monday Morning –
Everyone checks in
Amazon + Google
DNS Sensor
Anomalous Spikes
28
Many
researchers
ipVanish IPs
Sharing? – then something happened
• Sharing based upon VT detections + new_file?
• Takes ~4 days for files to reach VT from most sandbox
sources.
1st Gen 3rd Gen
HTTP unique IPs ~400 38
HTTP unique IP for source ~130 38
Valid HTTP Post 4 4
VT detections ~8/57 + 1/57
Sharing: Threat Intelligence Feeds?
Campaign First DNS First HTTP Threatfeed
UM 2015-08-29 22:47 2015-08-29 23:41 2015-08-30 06:33
AV 2015-08-30 17:08 2015-08-30 19:45 2015-08-30 18:43
A9 2015-09-03 20:33 2015-09-03 20:33 2015-10-24 08:55
A12 2015-09-03 20:45 2015-09-03 20:46 2015-10-27 18:47
AN 2015-09-08 07:10 2015-09-08 10:23 2015-09-08 17:55
C21 2015-10-22 00:28 - 2015-10-22 00:29
PS-Y 2016-01-11 23:21 2016-01-11 23:15 2016-01-13 04:14
Sharing: URL Reputation Services
• Crafted unique campaign IDs and timestamp domains
• Made queries for unique domains to ~50 reputation engines
• Three sites resulted in daily DNS lookups spanning > 5 days
• Two resulted in daily DNS lookups spanning nearly 2 months
• Most major AV/security companies networks represented
• YOUR QUERIES ARE SHARED (implicitly?/explicitly?)
• When you query these sites, you lose control of the
domain/URL
Threat Intel vs the Sandbox IPs?
• Of all the Sandbox IPs that made valid POST requests to our server 15 were
also identified in some threat intelligence feeds as malicious
• 6 were TOR IPs
• 1 was an Anonymous proxy
• All others were characterized:
• Bot IPs
• Spammer IPs
• Brute Force IPs
• Scanning IPs
• Compromised IPs (Hawkeye Keylogger, Dyre)
• Interesting, but not surprising
Lessons
• Most people use the same Sandbox Images
• Most sandboxes don’t change the environment settings across
executions
• AV thinks your file is malicious
• You will tip off the adversary
• Everyone will hit their network touch points … forever …
• Reputation services can result in noisy traffic to the NS
• Malware sandboxes can be fingerprinted with very simple techniques
• You get what you pay for
Contact
Jason Trost
• @jason_trost
• jason [dot] trost [AT] threatstream [dot] com
• https://github.com/jt6211
Aaron Shelmire
•@Ashelmire
•aaron[dot] shelmire [AT] threatstream [dot] com

More Related Content

PPTX
An Adversarial View of SaaS Malware Sandboxes
PPTX
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PPTX
R-CISC Summit 2016 Borderless Threat Intelligence
PPTX
Anomali Detect 2016 - Borderless Threat Intelligence
PPTX
Modern Honey Network (MHN)
PDF
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
PPTX
SANS CTI Summit 2016 Borderless Threat Intelligence
An Adversarial View of SaaS Malware Sandboxes
Distributed Sensor Data Contextualization for Threat Intelligence Analysis
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
R-CISC Summit 2016 Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
Modern Honey Network (MHN)
Identifying and Correlating Internet-wide Scan Traffic to Newsworthy Security...
SANS CTI Summit 2016 Borderless Threat Intelligence

What's hot (20)

PPTX
The Background Noise of the Internet
PDF
Threat Intelligence Field of Dreams
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PPTX
Incident Response for the Work-from-home Workforce
PDF
H@dfex 2015 malware analysis
PDF
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
PDF
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
PPTX
External to DA, the OS X Way
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PPTX
Weekend Malware Research 2012
PDF
No Easy Breach DerbyCon 2016
PDF
Attacker's Perspective of Active Directory
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Top 10 Threats to Cloud Security
PDF
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
PPT
Next Generation Advanced Malware Detection and Defense
The Background Noise of the Internet
Threat Intelligence Field of Dreams
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Incident Response for the Work-from-home Workforce
H@dfex 2015 malware analysis
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSIDES-PR Keynote Hunting for Bad Guys
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
Let’s Play Hide and Seek In the Cloud The APT Malwares Favored in Cloud Service
External to DA, the OS X Way
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
Weekend Malware Research 2012
No Easy Breach DerbyCon 2016
Attacker's Perspective of Active Directory
Creating Your Own Threat Intel Through Hunting & Visualization
Top 10 Threats to Cloud Security
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Next Generation Advanced Malware Detection and Defense
Ad

Viewers also liked (18)

DOCX
Rescue1.asd
PPS
Eye Catching Photos
PPT
Nair jure123456
PDF
Merkel double wiper_pt-1
DOC
6847575 a-saga-dos-foxworth-4-sementes-do-passado-virginia-c-andrews
PPS
Anh vui
PPTX
Some for all rather than more for some: A myth or an opportunity lost?
PPTX
Helping each other grow
PDF
Aceds 2011 E Discovery Conference Brochure Seth Row Voucher
PDF
Words Associated with Questions about Macros in Tex
PPT
Wamye Be Taniisaken!
PDF
Happy birthday to Prof. Yunus - you change foundation
DOCX
He devoted his life for the pride and honor of the country
PDF
A turukott 100tk
PPT
Versos
PPT
Building A Social Network Waa 1 17 07 V2 Draft
PPTX
Corporate Image Consulting
PDF
2006增刊目录
Rescue1.asd
Eye Catching Photos
Nair jure123456
Merkel double wiper_pt-1
6847575 a-saga-dos-foxworth-4-sementes-do-passado-virginia-c-andrews
Anh vui
Some for all rather than more for some: A myth or an opportunity lost?
Helping each other grow
Aceds 2011 E Discovery Conference Brochure Seth Row Voucher
Words Associated with Questions about Macros in Tex
Wamye Be Taniisaken!
Happy birthday to Prof. Yunus - you change foundation
He devoted his life for the pride and honor of the country
A turukott 100tk
Versos
Building A Social Network Waa 1 17 07 V2 Draft
Corporate Image Consulting
2006增刊目录
Ad

Similar to BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes (20)

PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PPTX
Sandbox kiev
PPTX
MMW Anti-Sandbox Techniques
PPTX
Mmw anti sandboxtricks
PPTX
Mmw anti sandbox_techniques
PPTX
Malware Analysis For The Enterprise
PPTX
Anomalies Detection: Windows OS - Part 1
PPTX
Anomalies Detection: Windows OS - Part 1
PDF
Sandbox vs manual analysis v2.1
PPTX
Securing your Cloud Environment v2
PPTX
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
PPTX
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
PDF
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
PDF
"A rootkits writer’s guide to defense" - Michal Purzynski
PPTX
Advanced malware analysis training session6 malware sandbox analysis
PDF
Watchtowers of the Internet - Source Boston 2012
PPTX
AktaionPPTv5_JZedits
PPTX
Have You Seen My Malware?
PDF
CheckPlease: Payload-Agnostic Targeted Malware
PDF
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox kiev
MMW Anti-Sandbox Techniques
Mmw anti sandboxtricks
Mmw anti sandbox_techniques
Malware Analysis For The Enterprise
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
Sandbox vs manual analysis v2.1
Securing your Cloud Environment v2
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
"A rootkits writer’s guide to defense" - Michal Purzynski
Advanced malware analysis training session6 malware sandbox analysis
Watchtowers of the Internet - Source Boston 2012
AktaionPPTv5_JZedits
Have You Seen My Malware?
CheckPlease: Payload-Agnostic Targeted Malware

Recently uploaded (20)

PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Essential Infomation Tech presentation.pptx
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
ai tools demonstartion for schools and inter college
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
medical staffing services at VALiNTRY
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
AI in Product Development-omnex systems
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Essential Infomation Tech presentation.pptx
Which alternative to Crystal Reports is best for small or large businesses.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
ai tools demonstartion for schools and inter college
Odoo POS Development Services by CandidRoot Solutions
medical staffing services at VALiNTRY
Operating system designcfffgfgggggggvggggggggg
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How Creative Agencies Leverage Project Management Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Softaken Excel to vCard Converter Software.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 41
AI in Product Development-omnex systems
Upgrade and Innovation Strategies for SAP ERP Customers

BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes

  • 1. An Adversarial View of SaaS Sandboxes Jason Trost Aaron Shelmire Jan 16th 2016
  • 2. Whois Jason Jason Trost •VP of Threat Research @ ThreatStream •Previously at Sandia, DoD, Booz Allen, Endgame Inc. •Background in Big Data Analytics, Security Research, Honeypots, and Machine Learning
  • 3. Whois Aaron Aaron Shelmire •Senior Threat Researcher @ ThreatStream •Previously at CERT, Secure Works CTU-SO, CMU •Background in Incident Response, Forensics, Security Research
  • 4. • Advanced Malware Detects Sandboxes! • Does it? • Threat Intelligence Feeds • AV is Dead! • You’re going to tip off the adversary!!! • Everyone’s going to know I’m compromised Motivation
  • 5. Experiment • Created Sensors with unique CampaignIDs • Encoded execution time and CampaignIDs in domain names • Tornado HTTP app and Bind DNS servers • Submitted unique samples to 29 free online Sandboxes • Submitted unique domains to ~50 domain/URL Reputation engines • Watched traffic roll in
  • 6. Sandboxes Tested Avira Comodo Instant Malware Analysis Comodo Valkyrie F-Secure Online Analysis Joe Sandbox – Private File-analyzer.net Malwr.com NSI Payload Security ThreatExpert TotalHash ViCheck Cloud.vmray.com Ether.gtisc.gatech.edu Threat track Anubic.iseclab.com Metascan-online Eureka-cyber-ta.org Microsoft portal Online.drweb.com uploadMalware VirusTotal Virusscan.jotti.org wepawet Virscan ViCheck ThreatStream’s internal sandbox
  • 7. Domain/URL Reputation Engines Tested app.webinspector.com malwaredomainlist.com senderscore.org trustedsource.org avgthreatlabs.com mxtoolbox.com/blacklists.aspx siteadvisor.com/sites unmaskparasites.com Bluecoat Web Pulse Passive Total sitecheck.sucuri.net URLVoid brightcloud.com Phishtank.com spam404.com urlblacklist.com Domain tools query Quttera spamhaus URLQuery dshield.org quttera.com Sucuri Sitecheck Virus Total URL query Fortiguard iprep reclassify.wrs.trendmicro.com SURBL VirusTotal URL domain/IP search Google Safe Browsing reputationauthority.org Threat Log vurl.mysteryfcm.co.uk Hosts-file.net safeweb.norton.com ThreatStream Web of Trust isithacked.com Scumware.org TotalHash wepawet.iseclab.org isitphishing.org senderbase.org trafficlight.bitdefender.com zulu.zscaler.com
  • 8. Our Sensor – v1 Enumerate Host Sockets Based Comms Create Run Key Delete Run Key Exit Process NO REMOTE ACCESS CAPABILITY
  • 10. Sensor C2 – HTTP POST Exfil HTTP POST zlib compression base64 encoded Worked pretty well, but…
  • 11. Sensor – v2 DNS Covert Channel C2 Some Sandboxes block TCP conns Most allow DNS unmodified zlib compression hex encode split data into chunks multiple DNS A requests
  • 13. Sandbox detection features ver. 1 • System Services Lists • Processes – VBoxService(1), vmtools (8) • MAC address • VMware, Inc. (55), Cadmus Computer Systems (40), ASUSTek COMPUTER INC. (23) • Bios • VMware (50), Bochs(34), ASUS(23), Google(8), Qemu(8) • Disk Size • 19.99GB (52), 25GB (37), 120GB (28), 50GB (20), 39GB (20) • RAM • 1GB (92), 1.5GB (18), 512MB (10) • Was the EXE renamed? • sample.exe, malware.exe, ${md5}.exe
  • 14. Really Detecting Virtual Machines • System Services Lists • Processes – VBoxService(1), vmtools (8) • MAC address • VMware, Inc. (55), Cadmus Computer Systems (40), ASUSTek COMPUTER INC. (23) • Bios • VMware (50), Bochs(34), ASUS(23), Google(8), Qemu(8) • Disk Size • 19.99GB (52), 25GB (37), 120GB (28), 50GB (20), 39GB (20) • RAM • 1GB (92), 1.5GB (18), 512MB (10) • Was the EXE renamed? • sample.exe, malware.exe, ${md5}.exe
  • 15. Sandbox Detection Techniques – Not Implemented • User Engagement • Dialog box, Double Click. Doc Scroll • Slow Mouse, Fast Sandbox • Execution after reboot • Pretty sure these would work • Require User engagement / Suspicion
  • 16. Sandbox detection features ver. 3 • Wanted to try some new checks… • Uptime – Malware checks for over 12 minutes? • Is Sleep patched? • Is the Security Information Descriptor valid ? • Really checking if AV is emulating the process • What Group is the user in?
  • 17. Sandbox detection features ver. 3 Uptime Is Sleep Patched? ValidSid Group ~60 minutes No Yes Administrators ~5 minutes No Yes Administrators ~2 minutes No Yes Administrators ~20 minutes No Yes Administrators 38 hosts w/ HTTP check in, only 4 valid check ins
  • 18. Sandbox Detection Techniques -- Way too Advanced!!!! • Many companies, but only a few virtual machines used! • Same usernames • Same hostnames • Same disk size • Same CPU count •And then…
  • 19. …just check the process name • artifact.exe • wbOxyeRLl6z7Jiq.exe • sampel.exe • 905DFEBA7A75DE9C6BF261CD5A076A5C5CB5FC1F.exe • samp1e_9ac36e185072270b0745ea0d68085dd9.exe GetModuleFileNameEx(hProcess, 0, lpBuff, MAX_PATH); if (lpBuff != lpszMyName) ExitProcess();
  • 20. So we had some other questions… • AV? • Tipping off the adversary? • Threat Intel Feeds?
  • 21. AV is Dead! • Is it?
  • 22. What did AV think of our sensor? • At first…
  • 23. Eventually… • VirusTotal: 6 Samples • Detection ranges from 8/57 to 30/57 • A lot of Trojan Zusy and Trojan Graftor • More malicious as time went on
  • 24. 3rd gen sensor… • Removed Sandbox accuracy checks • Run key that was added, then removed • Touch and Delete a file • Large amount of host profiling • Much more reasonable scoring • Accuracy is worse than before!
  • 25. Sharing? • Yup, Lots • Samples shared • Evidence of new executions seen from different origins • Domain names shared (or scraped) • Previous execution’s domains resolved later by other orgs, different nameservers • Some domains appear on threat intel lists • Many orgs are trivially identified as security companies • Every major AV company is represented in our DNS logs • Several Security Product Companies
  • 26. 2nd Submission DNS Sensor 1st Submission Monday Morning 3rd Submission Sleep Check Tipping off the Adversary
  • 27. Check In Activity 27 Trend Micro + Home Hosts Monday Morning – Everyone checks in Amazon + Google DNS Sensor
  • 29. Sharing? – then something happened • Sharing based upon VT detections + new_file? • Takes ~4 days for files to reach VT from most sandbox sources. 1st Gen 3rd Gen HTTP unique IPs ~400 38 HTTP unique IP for source ~130 38 Valid HTTP Post 4 4 VT detections ~8/57 + 1/57
  • 30. Sharing: Threat Intelligence Feeds? Campaign First DNS First HTTP Threatfeed UM 2015-08-29 22:47 2015-08-29 23:41 2015-08-30 06:33 AV 2015-08-30 17:08 2015-08-30 19:45 2015-08-30 18:43 A9 2015-09-03 20:33 2015-09-03 20:33 2015-10-24 08:55 A12 2015-09-03 20:45 2015-09-03 20:46 2015-10-27 18:47 AN 2015-09-08 07:10 2015-09-08 10:23 2015-09-08 17:55 C21 2015-10-22 00:28 - 2015-10-22 00:29 PS-Y 2016-01-11 23:21 2016-01-11 23:15 2016-01-13 04:14
  • 31. Sharing: URL Reputation Services • Crafted unique campaign IDs and timestamp domains • Made queries for unique domains to ~50 reputation engines • Three sites resulted in daily DNS lookups spanning > 5 days • Two resulted in daily DNS lookups spanning nearly 2 months • Most major AV/security companies networks represented • YOUR QUERIES ARE SHARED (implicitly?/explicitly?) • When you query these sites, you lose control of the domain/URL
  • 32. Threat Intel vs the Sandbox IPs? • Of all the Sandbox IPs that made valid POST requests to our server 15 were also identified in some threat intelligence feeds as malicious • 6 were TOR IPs • 1 was an Anonymous proxy • All others were characterized: • Bot IPs • Spammer IPs • Brute Force IPs • Scanning IPs • Compromised IPs (Hawkeye Keylogger, Dyre) • Interesting, but not surprising
  • 33. Lessons • Most people use the same Sandbox Images • Most sandboxes don’t change the environment settings across executions • AV thinks your file is malicious • You will tip off the adversary • Everyone will hit their network touch points … forever … • Reputation services can result in noisy traffic to the NS • Malware sandboxes can be fingerprinted with very simple techniques • You get what you pay for
  • 34. Contact Jason Trost • @jason_trost • jason [dot] trost [AT] threatstream [dot] com • https://github.com/jt6211 Aaron Shelmire •@Ashelmire •aaron[dot] shelmire [AT] threatstream [dot] com

Editor's Notes

  • #26: select timestamp::DATE, campaign_id, org, COUNT(1) from network_activity where host ILIKE '%.x.vpnlogin-it-helpdesk.com' group by 1,2,3 order by 3,1, 2;
  • #30: select timestamp::DATE, campaign_id, org, COUNT(1) from network_activity where host ILIKE '%.x.vpnlogin-it-helpdesk.com' group by 1,2,3 order by 3,1, 2;
  • #31: Several binaries that were initially sandboxed later resulted in more sandbox executions and those resulted in the domains making their way onto a commercial threat feed NOTE: this sensor has 0 to 1 AV detections and still made its way onto these feeds.