SlideShare a Scribd company logo
FFRI,Inc.
Fourteenforty Research Institute, Inc.
FFRI,Inc.
http://www.ffri.jp
Automated on-execute test using VirtualBox
Junichi Murakami
Executive Officer, Director of Advanced Development Division
Ver2.00.01
FFRI,Inc.
1. Background and motivation
2. Overview of a test
– automated on-execute test
– virtualization software and automation methods
– Oracle VM VirtualBox and its automation
– example of VBoxManage
3. Automation script
– FFRI AutoMonkey
– design concept
– throughput
– performance
4. References
5. Contact information
Agenda
2
FFRI,Inc.
• Automated test against a large amount of malware is required to evaluate a
malware detection engine
• Testing methods are classified into on-demand and on-access testing
• on-execute test which is a kind of on-access test has to execute malware one
by one
• Therefore automation based on virtualization is required
• This slides describes automated on-execute test method using VirtualBox
1.Background and motivation
3
malware scanning on-demand
on-access on-read/write
on-execute
* type of malware scanning
FFRI,Inc.
• Basic steps are following
1. Copy malware into a guest
2. Execute copied malware in the guest
3. Analyze or detect malware in the guest
4. Preserve the result after execution is terminated
5. Revert the guest back to original condition
6. Go to 1.
• Required functions to execute above are following
a. Copying a file to a guest from a host (copy-to)
b. Executing arbitrary a program in a guest from a host(exec)
c. Copying a file from guest to a host (copy-from)
d. Reverting a guest condition based on a snapshot(revert)
2.1.Automated on-execute testing
4
→ All functions can be achieved by making a communication interface between a host
and a guest using TCP/IP. We considered the way we do not need to involve
developing software as possible as we could
FFRI,Inc.
software Licence copy-to copy-from exec revert method
VMware Workstation Proprietary ○ ○ ○ ○ VIX API
VMware ESX(#1) Proprietary ○ ○ ○ ○ VIX API
Oracle VM VirtualBox GPL2 ○ ○ ○ ○ VBoxManage
QEMU + KVM GPL2(#2) × × × ○ Libvirt
2.2.virtualization software and automation methods
5
#1 ESXi can also use VIX API for 60days by registering a evaluation license.
#2 KVM's parts are licensed under various GNU licenses(GPL, GPL2, LGPL2, etc.)
• Use functions which virtualization software has natively
• VMware(licensed) and VritualBox have all the features we need
→ We considered using VirtualBox because of the cost advantage
• QEMU+KVM can be used by 3rd party software(ex: libguestfs + winexe)
– “Malware Analysis: Collaboration, Automation & Tuning”, Shmoocon 2013
http://www.slideshare.net/xabean/malware-analysis-16674048
FFRI,Inc.
• A kind of x86 virtualization software, currently developed by Oracle
• Version 4.0 and later, fully open source software (GPL2)
• Supporting various host and guest environments
– HostOS:Windows, Linux, Mac OS X, Solaris
– GuestOS:Windows, Linux, FreeBSD, OpenBSD, Mac OS X Server, Solaris,etc.
• CLI is available (VBoxManage), friendly to automation
– startvm , pause, resume, poweroff, clonevm, showvinfo
– copyto, copyfrom, exec
– taking snapshot and reverting
– control virtual machine devices status, etc.
2.3.Oracle VM VirtualBox and its automation
6
FFRI,Inc.
2.4.Example of VBoxManage
7
% vboxmanage startvm vm
% vboxmanage controlvm vm poweroff
% vboxmanage snapshot vm restore snapshot-1
% vboxmanage guestcontrol exec vm --image “c:/windows/system32/calc.exe” ¥
--username admin --timeout 60000 --wait-exit
% vboxmanage guestcontrol vm copyto “/some/file” “c:/file.txt” --username admin
* starting a guest
* power off a guest
* reverting a guest based on a snapshot
* execute a program in a guest from a host
* copying a file to a guest from a host
FFRI,Inc.
• Automation script using VBoxManage, just a shell script
– auto-monkey.sh:automation for copy, exec, copy, revert steps
– watch-monkey.sh:watch dog script for the monkey
• It can execute multiple test simultaneously, works individually
• Published at our website below, see README for the detail (License: BSD)
– http://www.ffri.jp/research/freeware.htm
3.1.FFRI AutoMonkey
8
VirtualBox(guest)
malware
log
auto-monkey.sh
watch-monkey.sh
VirtualBox(guest)
malware
log
auto-monkey.sh
watch-monkey.sh
image
snapshot
image
snapshot
FFRI,Inc.
• conform to KISS principle
• Estimation of remaining time is important for this kind of test
– we cannot determine when it would finish if the script hangs up
• Stability of VBoxManage (and VIX API) is the lifeline for the automation
• In fact, error occurs when it runs long time
– Failure by error
• exits immediately
• resumed a test automatically by watch-monkey.sh
– Hanging up(stuck) by error
• watch-monkey.sh monitors lifetime of a VirtualBox process
• if it is stuck, kill and resume
3.2.Design concept
9
FFRI,Inc.
• Testing under 1host and 7guest environment
• Processed 20,000 malware, each execution time was 60 seconds
– total elapsed time: 37h15m
– throughput:8.95 malware/minute
# if malware execution terminated less than 60 seconds, the script processes next item.
• Host and guest environment is following
3.3.Throughput
10
Hardware CPU: Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz
Memory: 8GB
HDD: 1.8TB x 1
Host OS Ubuntu 13.04 + VirtualBox 4.2
Guest OS Windows XP SP3(x86) + FFR yarai 2.3
CPU:1 CPU
Memory:750MB
FFRI,Inc.
• About 70% of total processor is idle state(each core also indicates same trend)
3.4.performance - processor
11
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
0:05
0:55
1:45
2:35
3:25
4:15
5:05
5:55
6:45
7:35
8:25
9:15
10:05
10:55
11:45
12:35
13:25
14:15
15:05
15:55
16:45
17:35
18:25
19:15
20:05
20:55
21:45
22:35
23:25
load
all processsor statistics
%idle
%steal
%iowait
%system
%nice
%user
FFRI,Inc.
• Consuming about 80% - 90% memory steadily
– real memory usage is between 2.5 and 4.0GB
3.4.performance - memory
12
0
500000
1000000
1500000
2000000
2500000
3000000
3500000
4000000
4500000
5000000
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
0:05
1:05
2:05
3:05
4:05
5:05
6:05
7:05
8:05
9:05
10:05
11:05
12:05
13:05
14:05
15:05
16:05
17:05
18:05
19:05
20:05
21:05
22:05
23:05
memory utilization statistics
kbmemused
kbmemfree
kbmemused
-(kbbuffers+kbcached)
FFRI,Inc.
• Disk busy ratio(%util) stays around 30% steadily
• The number of queued requests is between 4 and 8
3.4.performance – Disk IO
13
0
10
20
30
40
50
60
70
80
90
0
2
4
6
8
10
12
0:05
0:55
1:45
2:35
3:25
4:15
5:05
5:55
6:45
7:35
8:25
9:15
10:05
10:55
11:45
12:35
13:25
14:15
15:05
15:55
16:45
17:35
18:25
19:15
20:05
20:55
21:45
22:35
23:25
0:00
Usage of block device(/dev/sda)
avgqu-sz
%util
FFRI,Inc.
• None of CPU, memory and IO wasn’t bottleneck under 1host and 7guest
environment
• It seems we can add some more guests up to around 10 VMs according to
memory usage
• However, we have to consider requirement of a process which is executed in
a guest (cpu, memory)
3.4.performance - consideration
14
FFRI,Inc.
• http://www.ffri.jp/assets/files/research/freeware/FFRIAutoMonkey-1.0.tgz
• https://www.virtualbox.org/manual/UserManual.html
• http://www.slideshare.net/xabean/malware-analysis-16674048
• http://www.youtube.com/watch?v=peHdyUlchSM
• http://libguestfs.org/
• http://sourceforge.net/projects/winexe/files/
References
15
FFRI,Inc.
• E-Mail
– research-feedback@ffri.jp
• Twitter
– @FFRI_Research
Contact Information
16

More Related Content

ODP
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
PDF
BSides Denver: Stealthy, hypervisor-based malware analysis
PDF
CrySys guest-lecture: Virtual machine introspection on modern hardware
PDF
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
PDF
Virtual Machine Introspection with Xen
ODP
Pitfalls of virtual machine introspection on modern hardware
PDF
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
PDF
nullcon 2010 - The evil karmetasploit upgrade
Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
BSides Denver: Stealthy, hypervisor-based malware analysis
CrySys guest-lecture: Virtual machine introspection on modern hardware
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Virtual Machine Introspection with Xen
Pitfalls of virtual machine introspection on modern hardware
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
nullcon 2010 - The evil karmetasploit upgrade

What's hot (20)

PDF
BlueHat v18 || Massive scale usb device driver fuzz without device
PDF
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
PDF
OffensiveCon2022: Case Studies of Fuzzing with Xen
PDF
VM Forking and Hypervisor-based Fuzzing with Xen
PDF
Pitfalls and limits of dynamic malware analysis
PDF
Automate Yo'self -- SeaGL
PDF
Using QEMU for cross development
PDF
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
PDF
31c3 Presentation - Virtual Machine Introspection
ODP
Virtual Machine Introspection with Xen on ARM
ODP
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
PPTX
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
PPTX
VM Forking and Hypervisor-based fuzzing
PPTX
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
PDF
Memory Management in Android
PPTX
ShinoBOT Suite
PDF
Android Internals
PDF
Cloud Security with LibVMI
PDF
Масштабируемый и эффективный фаззинг Google Chrome
BlueHat v18 || Massive scale usb device driver fuzz without device
[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di ...
OffensiveCon2022: Case Studies of Fuzzing with Xen
VM Forking and Hypervisor-based Fuzzing with Xen
Pitfalls and limits of dynamic malware analysis
Automate Yo'self -- SeaGL
Using QEMU for cross development
Integrating web archiving in preservation workflows. Louise Fauduet, Clément ...
31c3 Presentation - Virtual Machine Introspection
Virtual Machine Introspection with Xen on ARM
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
VM Forking and Hypervisor-based fuzzing
Introduction of ShinoBOT (Black Hat USA 2013 Arsenal)
Memory Management in Android
ShinoBOT Suite
Android Internals
Cloud Security with LibVMI
Масштабируемый и эффективный фаззинг Google Chrome
Ad

Similar to Mr201309 automated on-execute_test_using_virtual_box_eng (20)

PDF
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
PDF
Malware Collection and Analysis via Hardware Virtualization
PDF
Aplura virtualization slides
PPTX
17-virtualization.pptx
ODP
Ece seminar 20070927
PDF
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
PDF
Rmll Virtualization As Is Tool 20090707 V1.0
PDF
RMLL / LSM 2009
PDF
Fighting advanced malware using machine learning (English)
PPTX
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
PPTX
VMI based malware detection in virtual environment
PDF
Freeze Drying for Capturing Environment-Sensitive Malware Alive
ODP
Comparison of Open Source Virtualization Technology
PDF
Look Into Libvirt Osier Yang
PPT
Unit II.ppt
PDF
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all started
PPTX
Bridging the Semantic Gap in Virtualized Environment
ODP
Stealthy, Hypervisor-based Malware Analysis
PDF
Virtualization.pdf
TENTACLE: Environment-Sensitive Malware Palpation(PacSec 2014)
Malware Collection and Analysis via Hardware Virtualization
Aplura virtualization slides
17-virtualization.pptx
Ece seminar 20070927
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
Rmll Virtualization As Is Tool 20090707 V1.0
RMLL / LSM 2009
Fighting advanced malware using machine learning (English)
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
VMI based malware detection in virtual environment
Freeze Drying for Capturing Environment-Sensitive Malware Alive
Comparison of Open Source Virtualization Technology
Look Into Libvirt Osier Yang
Unit II.ppt
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all started
Bridging the Semantic Gap in Virtualized Environment
Stealthy, Hypervisor-based Malware Analysis
Virtualization.pdf
Ad

More from FFRI, Inc. (20)

PDF
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
PDF
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
PDF
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
PDF
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
PDF
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
PDF
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
PDF
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
PDF
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
PDF
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
PDF
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
PDF
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
PDF
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
PDF
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
PDF
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
PDF
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
PDF
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
PDF
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
PDF
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
PDF
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
PDF
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
Appearances are deceiving: Novel offensive techniques in Windows 10/11 on ARM
TrustZone use case and trend (FFRI Monthly Research Mar 2017)
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
Black Hat Europe 2016 Survey Report (FFRI Monthly Research Dec 2016)
An Example of use the Threat Modeling Tool (FFRI Monthly Research Nov 2016)
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Black Hat USA 2016 Survey Report (FFRI Monthly Research 2016.8)
About security assessment framework “CHIPSEC” (FFRI Monthly Research 2016.7)
Black Hat USA 2016 Pre-Survey (FFRI Monthly Research 2016.6)
Black Hat Asia 2016 Survey Report (FFRI Monthly Research 2016.4)
ARMv8-M TrustZone: A New Security Feature for Embedded Systems (FFRI Monthly ...
CODE BLUE 2015 Report (FFRI Monthly Research 2015.11)
Latest Security Reports of Automobile and Vulnerability Assessment by CVSS v3...
Black Hat USA 2015 Survey Report (FFRI Monthly Research 201508)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)

Mr201309 automated on-execute_test_using_virtual_box_eng

  • 1. FFRI,Inc. Fourteenforty Research Institute, Inc. FFRI,Inc. http://www.ffri.jp Automated on-execute test using VirtualBox Junichi Murakami Executive Officer, Director of Advanced Development Division Ver2.00.01
  • 2. FFRI,Inc. 1. Background and motivation 2. Overview of a test – automated on-execute test – virtualization software and automation methods – Oracle VM VirtualBox and its automation – example of VBoxManage 3. Automation script – FFRI AutoMonkey – design concept – throughput – performance 4. References 5. Contact information Agenda 2
  • 3. FFRI,Inc. • Automated test against a large amount of malware is required to evaluate a malware detection engine • Testing methods are classified into on-demand and on-access testing • on-execute test which is a kind of on-access test has to execute malware one by one • Therefore automation based on virtualization is required • This slides describes automated on-execute test method using VirtualBox 1.Background and motivation 3 malware scanning on-demand on-access on-read/write on-execute * type of malware scanning
  • 4. FFRI,Inc. • Basic steps are following 1. Copy malware into a guest 2. Execute copied malware in the guest 3. Analyze or detect malware in the guest 4. Preserve the result after execution is terminated 5. Revert the guest back to original condition 6. Go to 1. • Required functions to execute above are following a. Copying a file to a guest from a host (copy-to) b. Executing arbitrary a program in a guest from a host(exec) c. Copying a file from guest to a host (copy-from) d. Reverting a guest condition based on a snapshot(revert) 2.1.Automated on-execute testing 4 → All functions can be achieved by making a communication interface between a host and a guest using TCP/IP. We considered the way we do not need to involve developing software as possible as we could
  • 5. FFRI,Inc. software Licence copy-to copy-from exec revert method VMware Workstation Proprietary ○ ○ ○ ○ VIX API VMware ESX(#1) Proprietary ○ ○ ○ ○ VIX API Oracle VM VirtualBox GPL2 ○ ○ ○ ○ VBoxManage QEMU + KVM GPL2(#2) × × × ○ Libvirt 2.2.virtualization software and automation methods 5 #1 ESXi can also use VIX API for 60days by registering a evaluation license. #2 KVM's parts are licensed under various GNU licenses(GPL, GPL2, LGPL2, etc.) • Use functions which virtualization software has natively • VMware(licensed) and VritualBox have all the features we need → We considered using VirtualBox because of the cost advantage • QEMU+KVM can be used by 3rd party software(ex: libguestfs + winexe) – “Malware Analysis: Collaboration, Automation & Tuning”, Shmoocon 2013 http://www.slideshare.net/xabean/malware-analysis-16674048
  • 6. FFRI,Inc. • A kind of x86 virtualization software, currently developed by Oracle • Version 4.0 and later, fully open source software (GPL2) • Supporting various host and guest environments – HostOS:Windows, Linux, Mac OS X, Solaris – GuestOS:Windows, Linux, FreeBSD, OpenBSD, Mac OS X Server, Solaris,etc. • CLI is available (VBoxManage), friendly to automation – startvm , pause, resume, poweroff, clonevm, showvinfo – copyto, copyfrom, exec – taking snapshot and reverting – control virtual machine devices status, etc. 2.3.Oracle VM VirtualBox and its automation 6
  • 7. FFRI,Inc. 2.4.Example of VBoxManage 7 % vboxmanage startvm vm % vboxmanage controlvm vm poweroff % vboxmanage snapshot vm restore snapshot-1 % vboxmanage guestcontrol exec vm --image “c:/windows/system32/calc.exe” ¥ --username admin --timeout 60000 --wait-exit % vboxmanage guestcontrol vm copyto “/some/file” “c:/file.txt” --username admin * starting a guest * power off a guest * reverting a guest based on a snapshot * execute a program in a guest from a host * copying a file to a guest from a host
  • 8. FFRI,Inc. • Automation script using VBoxManage, just a shell script – auto-monkey.sh:automation for copy, exec, copy, revert steps – watch-monkey.sh:watch dog script for the monkey • It can execute multiple test simultaneously, works individually • Published at our website below, see README for the detail (License: BSD) – http://www.ffri.jp/research/freeware.htm 3.1.FFRI AutoMonkey 8 VirtualBox(guest) malware log auto-monkey.sh watch-monkey.sh VirtualBox(guest) malware log auto-monkey.sh watch-monkey.sh image snapshot image snapshot
  • 9. FFRI,Inc. • conform to KISS principle • Estimation of remaining time is important for this kind of test – we cannot determine when it would finish if the script hangs up • Stability of VBoxManage (and VIX API) is the lifeline for the automation • In fact, error occurs when it runs long time – Failure by error • exits immediately • resumed a test automatically by watch-monkey.sh – Hanging up(stuck) by error • watch-monkey.sh monitors lifetime of a VirtualBox process • if it is stuck, kill and resume 3.2.Design concept 9
  • 10. FFRI,Inc. • Testing under 1host and 7guest environment • Processed 20,000 malware, each execution time was 60 seconds – total elapsed time: 37h15m – throughput:8.95 malware/minute # if malware execution terminated less than 60 seconds, the script processes next item. • Host and guest environment is following 3.3.Throughput 10 Hardware CPU: Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz Memory: 8GB HDD: 1.8TB x 1 Host OS Ubuntu 13.04 + VirtualBox 4.2 Guest OS Windows XP SP3(x86) + FFR yarai 2.3 CPU:1 CPU Memory:750MB
  • 11. FFRI,Inc. • About 70% of total processor is idle state(each core also indicates same trend) 3.4.performance - processor 11 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0:05 0:55 1:45 2:35 3:25 4:15 5:05 5:55 6:45 7:35 8:25 9:15 10:05 10:55 11:45 12:35 13:25 14:15 15:05 15:55 16:45 17:35 18:25 19:15 20:05 20:55 21:45 22:35 23:25 load all processsor statistics %idle %steal %iowait %system %nice %user
  • 12. FFRI,Inc. • Consuming about 80% - 90% memory steadily – real memory usage is between 2.5 and 4.0GB 3.4.performance - memory 12 0 500000 1000000 1500000 2000000 2500000 3000000 3500000 4000000 4500000 5000000 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0:05 1:05 2:05 3:05 4:05 5:05 6:05 7:05 8:05 9:05 10:05 11:05 12:05 13:05 14:05 15:05 16:05 17:05 18:05 19:05 20:05 21:05 22:05 23:05 memory utilization statistics kbmemused kbmemfree kbmemused -(kbbuffers+kbcached)
  • 13. FFRI,Inc. • Disk busy ratio(%util) stays around 30% steadily • The number of queued requests is between 4 and 8 3.4.performance – Disk IO 13 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 0:05 0:55 1:45 2:35 3:25 4:15 5:05 5:55 6:45 7:35 8:25 9:15 10:05 10:55 11:45 12:35 13:25 14:15 15:05 15:55 16:45 17:35 18:25 19:15 20:05 20:55 21:45 22:35 23:25 0:00 Usage of block device(/dev/sda) avgqu-sz %util
  • 14. FFRI,Inc. • None of CPU, memory and IO wasn’t bottleneck under 1host and 7guest environment • It seems we can add some more guests up to around 10 VMs according to memory usage • However, we have to consider requirement of a process which is executed in a guest (cpu, memory) 3.4.performance - consideration 14
  • 15. FFRI,Inc. • http://www.ffri.jp/assets/files/research/freeware/FFRIAutoMonkey-1.0.tgz • https://www.virtualbox.org/manual/UserManual.html • http://www.slideshare.net/xabean/malware-analysis-16674048 • http://www.youtube.com/watch?v=peHdyUlchSM • http://libguestfs.org/ • http://sourceforge.net/projects/winexe/files/ References 15
  • 16. FFRI,Inc. • E-Mail – research-feedback@ffri.jp • Twitter – @FFRI_Research Contact Information 16