Malware ResponseCenter 
MrRAOUFLAMARI 
PrivateHigherSchoolof Computer Science and Technologies 
End of StudiesProject 
National Agency for Computer Security 
ABDESSABOUR AROUS 
MrFOUEDZGHIDI
2
Motivation 
Anti malware products can’t handle all infections (specially new ones) 
200,000 newly unique malicious artifacts are collected per day (*) 
Getting infected is a matter of time 
Formatting the system disk is not always possible (production server) 
We need a complete checkup of the system 
* Source: http://www.sophos.com/en-us/support/knowledgebase/119112.aspx 
3
Motivation 4 
Microsoft Security Intelligence Report: Trends for the five locations with the highest malware infection rates in 2H13, by CCM (100,000 MSRT executions minimum) 
Tunisia is the second !!!
CurrentWorkflow (1/2) 
Security Analyst 
Email: assistance@ansi.tn 
Phone: 71 843 200 
On site assistance: 94 Jughurtaavenue, MutuelleVille, Tunis, Tunisia 
“My device performance is slowing down” 
“My AV has detected a malware called WIN32.X but he was unable to remove it !” 
“I have a window telling me that I need to pay some money to unlock my Computer” 
NACS Assistance activity 
Requests 
Citizen/Company 
5
Current Workflow (2/2) 
Email 
On site 
Phone 
Ask user to download and run an external tool 
User send tool report by email 
Usually no precise result 
Ask user to run a bootable AV solution 
Citizen 
Company 
1 
2 
3 
4 
5 
Askfor help via 
6
Goals & Objectives 7 
Build a system that provides all the facilities that the manual service already provides. 
Automate the hole process. 
Build a national capability in malware analysis field. 
Online, Easy to use, efficient, …
Proposedsolution 8 
Login/Register 
Download the scanner 
Upload the report 
Device 
Scan 
Generate a report 
Download a dedicated script 
Create a ticket 
Analyze the report 
Check externals resources 
Run the removal kit
Methodology 9 
SPRINT 0 
SPRINT 1 
SPRINT 2 
SPRINT 3 
SPRINT 4 
Project Start 
Modeling Architecture and Graphical User Interface 
Web App: 
Back Office 
Web App: 
Front Office 
Client: 
Windows Application 
We are AGILE 
SCRUM Based
Overallarchitecture 10 
Collect running applications 
Users management 
Tickets management 
Artifacts management 
Modules management 
Security Analysts management 
www 
Device Specific Code 
Web Application
Solution comparison 11 
Collect running applications 
Blacklist database 
Whitelist database 
Real time scanner 
System Scanner tools 
Antivirus 
Malware Response Center 
Ticketing system 
Malware Removal tools 
Cloud Analysis 
Remove Malicious codes
Why a new Cleaner/Scanner? 12 
Why building our own tank? 
National Information Security is like National territorial security! 
The improvement of non proprietary tool is not in your hand!
Overallarchitecture 13 
User 
Security Analyst 
Web Server 
Front End DB 
Back End DB 
External Resources 
Internals Resources 
Modules 
Remote Storage
External & Internal resources 
Online Malware database 
Sandboxes 
Local Malware database 
14 
MD5 : 5f62962605b4858e20bfaf6edc8eb521
Database 15 
Report{ 
Created At : 
TICKET_ID : 
OS_VERSION : 
MACHINE_UNIQUE_ID : 
PROCESSES : [ 
{ 
PROCESS_ID : 
EXE_FILE : 
PRIORITY_BASE : 
MODULES : [ 
{ 
MODULE_NAME : 
HASH : 
SIZE : 
} 
] 
} 
] 
} 
Ticket_Status 
•Id 
•Label 
Ticket 
•Id 
•Created At 
•Status_Id 
•Agent_Id 
•Citizen_Id 
•Description 
Agent 
•Id 
•Name 
•Firstname 
•Email 
•Password 
•Mobile 
Schema-less data 
Different Workload 
NOSQL+NOSQL OR SQL+NOSQL
Database 16 
Object Document mapper 
Doctrine 
Object Relational mapper 
class Ticket 
{ 
/** 
* @varinteger 
* 
* @ORMId 
*/ 
private $id; 
} 
Report{ 
Created At : 
TICKET_ID : 
OS_VERSION : 
MACHINE_UNIQUE_ID : 
} 
Class Report 
{ 
/** 
* @MongoDBId 
*/ 
protected $id; 
} 
Agent 
•Id 
•Name 
•Firstname 
•Email
Overallarchitecture (Client side) 17 
Processes 
Threads 
Loaded modules 
Device Drivers 
Graphical User Interface 
Dynamic Link Libraries 
Low level programming = C 
But C is not the reference in UI
Technologies used 
Client side: 
C# WPF UI 
C/C++/Assemblymodules (DLL) 
Server side: 
Nginxweb server 
Symfony2 framework 
Python 
MySQL front database 
MongoDB+ GridFsas backenddatabase 
Microsoft Azure Storage 
18
Source code management 
Gitkey features 
Distributed 
Speed 
Data integrity 
Gitlabkey features 
Free and open source 
Ticket management 
Request management 
Repositories, Users management 
19
Testing 
Unit testing(whateverrelevant) 
Client side( .NET ): Visual Studio Unit test framework 
Server side( PHP SYMFONY ): Symfony2 unit test 
BDD for acceptancetest 
Behat(PHP) 
Specflow(C#) 
20
Security 
OWASP TOP 10 Security flaws: 
Input sanitazing 
Anti CSRF token 
Confidentiality: SSL 
Vulnerabilityassesment 
Via automatedscanner 
21
Deploiement 
Currently in beta test version 
Looking to work with pioneer partners: 
To try the scanner and the online portal 
Features improvement 
Estimate system workload 
22
Implementation 23
Implementation 24
At the end 
We succeed to: 
Develop a solution that covers the assistance workflow (from the client to the ticketing system) 
More accurate Data about Tunisian Cyberspace: 
Operating systems distribution 
Infection distribution 
Device use evolution 
25 
Operating Systems 
Windows 7 
Windows XP 
Android 
Linux 
0 
2 
4 
6 
First Quarter 
SecondQuarter 
Third Quarter 
FourthQuarter 
Top malwares 
Windows 
Linux 
Android
Future works 
More scalable: 
Message Queuing 
Databasereplicationand clustering 
More automated: 
Learning mode: ArtificialIntelligence, Expert System 
More defensein depth: 
More granularsecurity 
MandatoryAccess Controleimplementation 
Support more devices: iOS –Mac OS –etc… 
Feedback system and Social media integration. 
26
27
28 
Question

More Related Content

PDF
Introduction to malwares
PDF
Ceh v8 labs module 05 system hacking
PPT
Black Energy18 - Russian botnet package analysis
PDF
MNSEC 2018 - Windows forensics
PDF
Finfisher- Nguyễn Chấn Việt
PPTX
Malware Analysis and Defeating using Virtual Machines
PDF
Hunting malware via memory forensics
PDF
Ceh v8 labs module 03 scanning networks
Introduction to malwares
Ceh v8 labs module 05 system hacking
Black Energy18 - Russian botnet package analysis
MNSEC 2018 - Windows forensics
Finfisher- Nguyễn Chấn Việt
Malware Analysis and Defeating using Virtual Machines
Hunting malware via memory forensics
Ceh v8 labs module 03 scanning networks

What's hot (15)

PPTX
Living off the land and fileless attack techniques
PPTX
A walk through Windows firewall and Netsh commands
PDF
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
PPTX
Top 10 Latest Viruses
PDF
Persistence in windows
PDF
Assingment 5 - ENSA
PPSX
Stuxnet - More then a virus.
PDF
Automated defense from rootkit attacks
PPTX
Basic Malware Analysis
PPT
Stuxnet flame
PPTX
metaploit framework
PDF
Ceh v8 labs module 04 enumeration
TXT
Adw cleaner[c0]
PDF
SANS Windows Artifact Analysis 2012
Living off the land and fileless attack techniques
A walk through Windows firewall and Netsh commands
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
Top 10 Latest Viruses
Persistence in windows
Assingment 5 - ENSA
Stuxnet - More then a virus.
Automated defense from rootkit attacks
Basic Malware Analysis
Stuxnet flame
metaploit framework
Ceh v8 labs module 04 enumeration
Adw cleaner[c0]
SANS Windows Artifact Analysis 2012
Ad

Viewers also liked (20)

PPT
Mica 2012
PPT
Kees Schiphouwer Responsum onderzoek
PPT
WETEC Compellent Enterprise Manager 3.1
PPT
Digital Tattoo Workshop for BCLA/PNLA
PDF
Vender por internet con eventos virtuales
PPTX
Mugshot Catalog Review
PPS
Luis emilio velutini tipos de-perros
PPT
Fraude En La Red Jonathan
PPTX
One direction
PDF
Pinizsi_portfolio_2
PDF
Bo corporate brochure
PDF
Defendiendo nuestras-tradiciones-tomo-ii1-
PDF
Relato de una CoP (2)
PDF
01. gutuna ikasleak 1415rako
PDF
AERIS Xango
PDF
Envolvedora stretch-hood-boreas
PPSX
There Once Was A Blue Moon P
PPTX
Macedònia "Superfashion"
PPTX
Presentazione Frosmo in italiano Nov2015
PPSX
Histoire revue par petit Grincheux série 4
Mica 2012
Kees Schiphouwer Responsum onderzoek
WETEC Compellent Enterprise Manager 3.1
Digital Tattoo Workshop for BCLA/PNLA
Vender por internet con eventos virtuales
Mugshot Catalog Review
Luis emilio velutini tipos de-perros
Fraude En La Red Jonathan
One direction
Pinizsi_portfolio_2
Bo corporate brochure
Defendiendo nuestras-tradiciones-tomo-ii1-
Relato de una CoP (2)
01. gutuna ikasleak 1415rako
AERIS Xango
Envolvedora stretch-hood-boreas
There Once Was A Blue Moon P
Macedònia "Superfashion"
Presentazione Frosmo in italiano Nov2015
Histoire revue par petit Grincheux série 4
Ad

Similar to End of Studies project: Malware Repsonse Center (20)

PPT
Software Security in the Real World
PPTX
Security engineering
PPTX
Chapter 12 Managing Systems Support and Security .pptx
PDF
Data Leakage Prevention - K. K. Mookhey
PDF
chapter12-120827115424-phpapp01.pdf
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PDF
I got 99 trends and a # is all of them
PPT
Cio ciso security_strategyv1.1
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Preventing The Next Data Breach Through Log Management
PDF
The New Mobile Landscape - OWASP Ireland
PPT
Software Security Engineering
PDF
Application Security Program Management with Vulnerability Manager
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PDF
The Future of Software Security Assurance
PDF
Jonathan raymond 2010 rotman telus - atlseccon2011
PDF
19BCP072_Presentation_Final.pdf
PPTX
Malware analysis as a hobby (Owasp Göteborg)
Software Security in the Real World
Security engineering
Chapter 12 Managing Systems Support and Security .pptx
Data Leakage Prevention - K. K. Mookhey
chapter12-120827115424-phpapp01.pdf
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
I got 99 trends and a # is all of them
Cio ciso security_strategyv1.1
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Preventing The Next Data Breach Through Log Management
The New Mobile Landscape - OWASP Ireland
Software Security Engineering
Application Security Program Management with Vulnerability Manager
“8th National Biennial Conference on Medical Informatics 2012”
The Future of Software Security Assurance
Jonathan raymond 2010 rotman telus - atlseccon2011
19BCP072_Presentation_Final.pdf
Malware analysis as a hobby (Owasp Göteborg)

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
August Patch Tuesday
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Modernising the Digital Integration Hub
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Five Habits of High-Impact Board Members
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
The various Industrial Revolutions .pptx
August Patch Tuesday
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Modernising the Digital Integration Hub
1 - Historical Antecedents, Social Consideration.pdf
Getting Started with Data Integration: FME Form 101
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
DP Operators-handbook-extract for the Mautical Institute
observCloud-Native Containerability and monitoring.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A review of recent deep learning applications in wood surface defect identifi...
Hindi spoken digit analysis for native and non-native speakers
O2C Customer Invoices to Receipt V15A.pptx
Five Habits of High-Impact Board Members
A contest of sentiment analysis: k-nearest neighbor versus neural network
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

End of Studies project: Malware Repsonse Center

  • 1. Malware ResponseCenter MrRAOUFLAMARI PrivateHigherSchoolof Computer Science and Technologies End of StudiesProject National Agency for Computer Security ABDESSABOUR AROUS MrFOUEDZGHIDI
  • 2. 2
  • 3. Motivation Anti malware products can’t handle all infections (specially new ones) 200,000 newly unique malicious artifacts are collected per day (*) Getting infected is a matter of time Formatting the system disk is not always possible (production server) We need a complete checkup of the system * Source: http://www.sophos.com/en-us/support/knowledgebase/119112.aspx 3
  • 4. Motivation 4 Microsoft Security Intelligence Report: Trends for the five locations with the highest malware infection rates in 2H13, by CCM (100,000 MSRT executions minimum) Tunisia is the second !!!
  • 5. CurrentWorkflow (1/2) Security Analyst Email: assistance@ansi.tn Phone: 71 843 200 On site assistance: 94 Jughurtaavenue, MutuelleVille, Tunis, Tunisia “My device performance is slowing down” “My AV has detected a malware called WIN32.X but he was unable to remove it !” “I have a window telling me that I need to pay some money to unlock my Computer” NACS Assistance activity Requests Citizen/Company 5
  • 6. Current Workflow (2/2) Email On site Phone Ask user to download and run an external tool User send tool report by email Usually no precise result Ask user to run a bootable AV solution Citizen Company 1 2 3 4 5 Askfor help via 6
  • 7. Goals & Objectives 7 Build a system that provides all the facilities that the manual service already provides. Automate the hole process. Build a national capability in malware analysis field. Online, Easy to use, efficient, …
  • 8. Proposedsolution 8 Login/Register Download the scanner Upload the report Device Scan Generate a report Download a dedicated script Create a ticket Analyze the report Check externals resources Run the removal kit
  • 9. Methodology 9 SPRINT 0 SPRINT 1 SPRINT 2 SPRINT 3 SPRINT 4 Project Start Modeling Architecture and Graphical User Interface Web App: Back Office Web App: Front Office Client: Windows Application We are AGILE SCRUM Based
  • 10. Overallarchitecture 10 Collect running applications Users management Tickets management Artifacts management Modules management Security Analysts management www Device Specific Code Web Application
  • 11. Solution comparison 11 Collect running applications Blacklist database Whitelist database Real time scanner System Scanner tools Antivirus Malware Response Center Ticketing system Malware Removal tools Cloud Analysis Remove Malicious codes
  • 12. Why a new Cleaner/Scanner? 12 Why building our own tank? National Information Security is like National territorial security! The improvement of non proprietary tool is not in your hand!
  • 13. Overallarchitecture 13 User Security Analyst Web Server Front End DB Back End DB External Resources Internals Resources Modules Remote Storage
  • 14. External & Internal resources Online Malware database Sandboxes Local Malware database 14 MD5 : 5f62962605b4858e20bfaf6edc8eb521
  • 15. Database 15 Report{ Created At : TICKET_ID : OS_VERSION : MACHINE_UNIQUE_ID : PROCESSES : [ { PROCESS_ID : EXE_FILE : PRIORITY_BASE : MODULES : [ { MODULE_NAME : HASH : SIZE : } ] } ] } Ticket_Status •Id •Label Ticket •Id •Created At •Status_Id •Agent_Id •Citizen_Id •Description Agent •Id •Name •Firstname •Email •Password •Mobile Schema-less data Different Workload NOSQL+NOSQL OR SQL+NOSQL
  • 16. Database 16 Object Document mapper Doctrine Object Relational mapper class Ticket { /** * @varinteger * * @ORMId */ private $id; } Report{ Created At : TICKET_ID : OS_VERSION : MACHINE_UNIQUE_ID : } Class Report { /** * @MongoDBId */ protected $id; } Agent •Id •Name •Firstname •Email
  • 17. Overallarchitecture (Client side) 17 Processes Threads Loaded modules Device Drivers Graphical User Interface Dynamic Link Libraries Low level programming = C But C is not the reference in UI
  • 18. Technologies used Client side: C# WPF UI C/C++/Assemblymodules (DLL) Server side: Nginxweb server Symfony2 framework Python MySQL front database MongoDB+ GridFsas backenddatabase Microsoft Azure Storage 18
  • 19. Source code management Gitkey features Distributed Speed Data integrity Gitlabkey features Free and open source Ticket management Request management Repositories, Users management 19
  • 20. Testing Unit testing(whateverrelevant) Client side( .NET ): Visual Studio Unit test framework Server side( PHP SYMFONY ): Symfony2 unit test BDD for acceptancetest Behat(PHP) Specflow(C#) 20
  • 21. Security OWASP TOP 10 Security flaws: Input sanitazing Anti CSRF token Confidentiality: SSL Vulnerabilityassesment Via automatedscanner 21
  • 22. Deploiement Currently in beta test version Looking to work with pioneer partners: To try the scanner and the online portal Features improvement Estimate system workload 22
  • 25. At the end We succeed to: Develop a solution that covers the assistance workflow (from the client to the ticketing system) More accurate Data about Tunisian Cyberspace: Operating systems distribution Infection distribution Device use evolution 25 Operating Systems Windows 7 Windows XP Android Linux 0 2 4 6 First Quarter SecondQuarter Third Quarter FourthQuarter Top malwares Windows Linux Android
  • 26. Future works More scalable: Message Queuing Databasereplicationand clustering More automated: Learning mode: ArtificialIntelligence, Expert System More defensein depth: More granularsecurity MandatoryAccess Controleimplementation Support more devices: iOS –Mac OS –etc… Feedback system and Social media integration. 26
  • 27. 27