Northeastern University
International Secure Systems Lab
A Large-Scale, Automated Approach to
Detecting Ransomware
Amin Kharraz, Sajjad Arshad, Collin Mulliner,
William Robertson, Engin Kirda
NEU SECLAB
NEU SECLAB
What is a ransomware attack?
Receiving the decryption key2
Paying the ransom fee1
2
NEU SECLAB
3
A Typical Ransom Note
NEU SECLAB
4
Attacks on Hospitals
NEU SECLAB
5
NEU SECLAB
7
– CNN Interview with FBI, April 2016
“Cyber-criminals collected $209 million in the first three
months of 2016 by extorting businesses and institutions to
unlock computer servers.”
NEU SECLAB
8
How to defend against ransomware attacks?
● Educating end-users
- Have a reliable backup policy
- Avoid risky online behavior
● Developing detection tools to assist defenders
- Providing insight from internal behavior
● Developing protection tools to enhance AV capabilities
- Stopping the attack, and keeping the data consistent
NEU SECLAB
8
How to defend against ransomware attacks?
● Educating end-users
- Have a reliable backup policy
- Avoid risky online behavior
● Developing detection tools to assist defenders
- Providing insight from internal behavior
● Developing protection tools to enhance AV capabilities
- Stopping the attack, and keeping the data consistent
NEU SECLAB
9
Threat Model
● Ransomware can employ any techniques to attack
- Inject code into benign processes
- Perform encrypted communication
- Leverage arbitrary cryptosystems
● We assume that OS kernel, and underlying software
and hardware stack are free of malicious code.
● Unveil detects ransomware during dynamic analysis
phase, and not at end-user machines.
- Complements current dynamic analysis systems
- A cloud-based malware analysis service, sample sharing
But, how can we detect a ransomware sample?
NEU SECLAB
10
Achilles’ Heel of Ransomware
• Ransomware has to inform victim that attack has taken
place
• Ransomware has certain behaviors that are predictable
– e.g., entropy changes, modal dialogs and background activity,
accessing user files
• A good sandbox that looks for some of these signs helps
here…
NEU SECLAB
10
UNVEIL: An Early Warning Dynamic
Detection System for Ransomware
UNVEIL’s Architecture
NEU SECLAB
11
NEU SECLAB
Approach
12
• Detecting Cryptographic Ransomware:
• Generating a fake (and attractive) user environment
• Finding a reliable method for monitoring filesystem
activity
Why do we generate fake user environments?
• Making the analysis environment more realistic
• Protecting the analysis system from some user environment
fingerprinting
- A static user environment can be easily detected by a
malware
NEU SECLAB
Approach
12
• Detecting Cryptographic Ransomware:
• Generating a fake (and attractive) user environment
• Finding a reliable method for monitoring filesystem
activity
Why do we generate fake user environments?
• Making the analysis environment more realistic
• Protecting the analysis system from bare-user environment
fingerprinting
- A static user environment can be easily detected by a
malware
How do we generate fake user environments?
NEU SECLAB
13
Generating Fake (Honey) Content
• Real files with valid headers
– Using standard libraries (e.g., python- docx, python-pptx,
OpenSSL)
– Content that appears meaningful
– File names do not look random, and appear realistic
• File paths
– User’s directory structure is generated randomly, but
meaningfully
• File attributes
– Generate content with different creation, modification, and
access times
User
Kernel
Content
Generator
I/O MANAGER
UNVEIL
NEU SECLAB
15
User
Kernel
Rfs = <Time,Pname,Pid,PPid,IRPflag,Arg,Result,BufEntropy>
I/O MANAGER
UNVEIL
NEU SECLAB
17
Extracting I/O Access Sequences
(1) Overwrites the users’ file with an encrypted version
(2) reads, encrypts and deletes files without wiping them from storage
(3) reads, creates a new encrypted version, and securely deletes
the original files
NEU SECLAB
18
IO Access Sequences in Multiple Ransomware Families
Read
Write
New File
Encrypted
version
Deleting the
Original File
New File
Encrypted
version
Secure
Deletion
NEU SECLAB
19
Iteration over files during a CryptoWall attack
Desktop Locker Ransomware
NEU SECLAB
1
Malware run
2
3
20
Desktop Locker Ransomware
NEU SECLAB
20
Dissimilarity Score
NEU SECLAB
21
Preparing the Analysis Environment
● UNVEIL is deployed on top of Cuckoo Sandbox
- UNVEIL supports all versions of Windows platforms.
- Our tool is deployed in Kernel.
- Bypassing UNVEIL is not technically easy in user-mode.
● Finding active malware is not easy
- We modified some parts of Cuckoo to make it more
resilient to environmentally sensitive samples
- e.g., fake response to some of the environment checks
- Other anti-evasion measures to look more realistic
- e.g., defining multiple NTFS drives, changing IP address
range and MAC addresses
NEU SECLAB
22
Evaluation
1) Detecting known ransomware samples
a) Collecting ~3500 ransomware from public repo, Anubis, two
security companies.
b) 149 benign executables including ransomware-like behavior
c) 348 malware samples from 36 malware families
Ransomware FamiliesBenign Applications
NEU SECLAB
23
Dissimilarity score is different from family to family
NEU SECLAB
Detecting known ransomware samples
The threshold value t = 0.32 gives the highest recall with 100% precision
24
NEU SECLAB
Evaluation UNVEIL with unknown samples
25
. . .56 UNVEIL-enabled
VMs on 8 Servers
Ganeti Cluster
~ 1200 malware samples per day
NEU SECLAB
Evaluation UNVEIL with unknown samples
● We used the same similarity threshold (t = 0.32) for the large scale
experiment.
● The incoming samples were acquired from the daily malware feed provided
by Anubis from March 18 to February 12, 2016.
● The dataset contained 148,223 distinct samples.
26
NEU SECLAB
Cross-checking with VirusTotal
27
● Pollution ratio is defined as the ratio of the number of scanners that identified
the sample to the number of scanners in VirusTotal
NEU SECLAB
Detection Results
28
NEU SECLAB
Detection: New Ransomware Family
29
NEU SECLAB
Detection: New Ransomware Family
30
• During our experiments, we discovered a new
malware family
– We call it “SilentCrypt”
– After we reported it, others started detecting it as well
– We were not able to find any information about this family
online
– The ransomware first checks for private files of a user,
contacts the C&C server, and starts the attack based on the
answer
NEU SECLAB
Detection: New Ransomware Family
31
NEU SECLAB
32
● Ransomware is a serious threat
● UNVEIL introduces concrete models to detect
Ransomware
● Detecting an unknown family shows that the solutions
are useful in practice
● We continue to improve functionality tuned towards
detecting ransomware
Conclusion
NEU SECLAB
34
Thank You

More Related Content

PPT
Chapter 5 Planning for Security-students.ppt
PPT
8. operations security
DOCX
Chapter 11 personnel_and_security
PPTX
Program security
PPT
Security technologies
DOCX
Chapter 06 risk_management_identifying_and_assessing_risk
PPT
The Trouble with Cloud Forensics
PPT
Software process and project metrics
Chapter 5 Planning for Security-students.ppt
8. operations security
Chapter 11 personnel_and_security
Program security
Security technologies
Chapter 06 risk_management_identifying_and_assessing_risk
The Trouble with Cloud Forensics
Software process and project metrics

What's hot (12)

PPTX
Software Process and Project Management - CS832E02 unit 3
PDF
A Structured Approach to Requirements Analysis (lecture slides)
PPTX
Network Security - Block cipher
PPT
Basic Security Chapter 1
PPTX
Linux security introduction
PDF
Computer Security: Principles of Information Security
PPT
Reconnaissance & Scanning
PPTX
Computer Security Chapter 1
PPTX
Software project management introduction
PDF
Implementation of Software Testing
PPT
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
PPTX
Introduction to exploring hci
Software Process and Project Management - CS832E02 unit 3
A Structured Approach to Requirements Analysis (lecture slides)
Network Security - Block cipher
Basic Security Chapter 1
Linux security introduction
Computer Security: Principles of Information Security
Reconnaissance & Scanning
Computer Security Chapter 1
Software project management introduction
Implementation of Software Testing
Information Security Lesson 2 - Attackers and Attacks - Eric Vanderburg
Introduction to exploring hci
Ad

Similar to UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware (20)

PPTX
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
PDF
Project in malware analysis:C2C
PPTX
Countering Innovative Sandbox Evasion Techniques Used by Malware
PPTX
Multi level ransomware analysis MALCON 2019 conference
PPTX
novel ransomware detection by Deep learning
PDF
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
PDF
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
PPTX
44Con Malware Workshop
PDF
CNIT 126: Ch 2 & 3
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PDF
H@dfex 2015 malware analysis
PDF
Malware Analysis -an overview by PP Singh
PDF
'Malware Analysis' by PP Singh
PDF
Volatile IOCs for Fast Incident Response
PDF
Analysing Ransomware
PDF
ADVANCED MALWARE THREATS -- NO HAT 2019 (BERGAMO / ITALY)
PPTX
Building next gen malware behavioural analysis environment
PDF
Malware Analysis: Ransomware
PDF
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
PPTX
CheckPoint: Anatomy of an evolving bot
Functional and Behavioral Analysis of Different Type of Ransomware.pptx
Project in malware analysis:C2C
Countering Innovative Sandbox Evasion Techniques Used by Malware
Multi level ransomware analysis MALCON 2019 conference
novel ransomware detection by Deep learning
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
44Con Malware Workshop
CNIT 126: Ch 2 & 3
Cyber Defense Forensic Analyst - Real World Hands-on Examples
H@dfex 2015 malware analysis
Malware Analysis -an overview by PP Singh
'Malware Analysis' by PP Singh
Volatile IOCs for Fast Incident Response
Analysing Ransomware
ADVANCED MALWARE THREATS -- NO HAT 2019 (BERGAMO / ITALY)
Building next gen malware behavioural analysis environment
Malware Analysis: Ransomware
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...
CheckPoint: Anatomy of an evolving bot
Ad

More from Sajjad "JJ" Arshad (16)

PDF
Cached and Confused: Web Cache Deception in the Wild
PDF
Cached and Confused: Web Cache Deception in the Wild
PDF
Cached and Confused: Web Cache Deception in the Wild
PDF
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Gu...
PDF
Large-Scale Analysis of Style Injection by Relative Path Overwrite
PDF
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
PDF
How Tracking Companies Circumvent Ad Blockers Using WebSockets
PDF
Practical Challenges of Type Checking in Control Flow Integrity
PDF
Understanding and Mitigating the Security Risks of Content Inclusion in Web B...
PDF
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
PDF
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Librari...
PDF
A Longitudinal Analysis of the ads.txt Standard
PDF
How Tracking Companies Circumvented Ad Blockers Using WebSockets
PDF
"Recommended For You": A First Look at Content Recommendation Networks
PDF
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
PDF
On the Effectiveness of Type-based Control Flow Integrity
Cached and Confused: Web Cache Deception in the Wild
Cached and Confused: Web Cache Deception in the Wild
Cached and Confused: Web Cache Deception in the Wild
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Gu...
Large-Scale Analysis of Style Injection by Relative Path Overwrite
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
How Tracking Companies Circumvent Ad Blockers Using WebSockets
Practical Challenges of Type Checking in Control Flow Integrity
Understanding and Mitigating the Security Risks of Content Inclusion in Web B...
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Librari...
A Longitudinal Analysis of the ads.txt Standard
How Tracking Companies Circumvented Ad Blockers Using WebSockets
"Recommended For You": A First Look at Content Recommendation Networks
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
On the Effectiveness of Type-based Control Flow Integrity

Recently uploaded (20)

PDF
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
PPTX
Understanding the Circulatory System……..
PPT
Cell Structure Description and Functions
PPTX
Presentation1 INTRODUCTION TO ENZYMES.pptx
PPTX
Introduction to Immunology (Unit-1).pptx
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PPT
Mutation in dna of bacteria and repairss
PDF
Metabolic Acidosis. pa,oakw,llwla,wwwwqw
PPTX
PMR- PPT.pptx for students and doctors tt
PPTX
LIPID & AMINO ACID METABOLISM UNIT-III, B PHARM II SEMESTER
PDF
5.Physics 8-WBS_Light.pdfFHDGJDJHFGHJHFTY
PDF
Chapter 3 - Human Development Poweroint presentation
PPTX
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
PPT
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
PPTX
diabetes and its complications nephropathy neuropathy
PPTX
endocrine - management of adrenal incidentaloma.pptx
PPTX
ELISA(Enzyme linked immunosorbent assay)
PPTX
HAEMATOLOGICAL DISEASES lack of red blood cells, which carry oxygen throughou...
PDF
CuO Nps photocatalysts 15156456551564161
PDF
Packaging materials of fruits and vegetables
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
Understanding the Circulatory System……..
Cell Structure Description and Functions
Presentation1 INTRODUCTION TO ENZYMES.pptx
Introduction to Immunology (Unit-1).pptx
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Mutation in dna of bacteria and repairss
Metabolic Acidosis. pa,oakw,llwla,wwwwqw
PMR- PPT.pptx for students and doctors tt
LIPID & AMINO ACID METABOLISM UNIT-III, B PHARM II SEMESTER
5.Physics 8-WBS_Light.pdfFHDGJDJHFGHJHFTY
Chapter 3 - Human Development Poweroint presentation
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
diabetes and its complications nephropathy neuropathy
endocrine - management of adrenal incidentaloma.pptx
ELISA(Enzyme linked immunosorbent assay)
HAEMATOLOGICAL DISEASES lack of red blood cells, which carry oxygen throughou...
CuO Nps photocatalysts 15156456551564161
Packaging materials of fruits and vegetables

UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware

  • 1. Northeastern University International Secure Systems Lab A Large-Scale, Automated Approach to Detecting Ransomware Amin Kharraz, Sajjad Arshad, Collin Mulliner, William Robertson, Engin Kirda NEU SECLAB
  • 2. NEU SECLAB What is a ransomware attack? Receiving the decryption key2 Paying the ransom fee1 2
  • 7. – CNN Interview with FBI, April 2016 “Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers.”
  • 8. NEU SECLAB 8 How to defend against ransomware attacks? ● Educating end-users - Have a reliable backup policy - Avoid risky online behavior ● Developing detection tools to assist defenders - Providing insight from internal behavior ● Developing protection tools to enhance AV capabilities - Stopping the attack, and keeping the data consistent
  • 9. NEU SECLAB 8 How to defend against ransomware attacks? ● Educating end-users - Have a reliable backup policy - Avoid risky online behavior ● Developing detection tools to assist defenders - Providing insight from internal behavior ● Developing protection tools to enhance AV capabilities - Stopping the attack, and keeping the data consistent
  • 10. NEU SECLAB 9 Threat Model ● Ransomware can employ any techniques to attack - Inject code into benign processes - Perform encrypted communication - Leverage arbitrary cryptosystems ● We assume that OS kernel, and underlying software and hardware stack are free of malicious code. ● Unveil detects ransomware during dynamic analysis phase, and not at end-user machines. - Complements current dynamic analysis systems - A cloud-based malware analysis service, sample sharing But, how can we detect a ransomware sample?
  • 11. NEU SECLAB 10 Achilles’ Heel of Ransomware • Ransomware has to inform victim that attack has taken place • Ransomware has certain behaviors that are predictable – e.g., entropy changes, modal dialogs and background activity, accessing user files • A good sandbox that looks for some of these signs helps here…
  • 12. NEU SECLAB 10 UNVEIL: An Early Warning Dynamic Detection System for Ransomware
  • 14. NEU SECLAB Approach 12 • Detecting Cryptographic Ransomware: • Generating a fake (and attractive) user environment • Finding a reliable method for monitoring filesystem activity Why do we generate fake user environments? • Making the analysis environment more realistic • Protecting the analysis system from some user environment fingerprinting - A static user environment can be easily detected by a malware
  • 15. NEU SECLAB Approach 12 • Detecting Cryptographic Ransomware: • Generating a fake (and attractive) user environment • Finding a reliable method for monitoring filesystem activity Why do we generate fake user environments? • Making the analysis environment more realistic • Protecting the analysis system from bare-user environment fingerprinting - A static user environment can be easily detected by a malware How do we generate fake user environments?
  • 16. NEU SECLAB 13 Generating Fake (Honey) Content • Real files with valid headers – Using standard libraries (e.g., python- docx, python-pptx, OpenSSL) – Content that appears meaningful – File names do not look random, and appear realistic • File paths – User’s directory structure is generated randomly, but meaningfully • File attributes – Generate content with different creation, modification, and access times
  • 19. NEU SECLAB 17 Extracting I/O Access Sequences (1) Overwrites the users’ file with an encrypted version (2) reads, encrypts and deletes files without wiping them from storage (3) reads, creates a new encrypted version, and securely deletes the original files
  • 20. NEU SECLAB 18 IO Access Sequences in Multiple Ransomware Families Read Write New File Encrypted version Deleting the Original File New File Encrypted version Secure Deletion
  • 21. NEU SECLAB 19 Iteration over files during a CryptoWall attack
  • 22. Desktop Locker Ransomware NEU SECLAB 1 Malware run 2 3 20
  • 23. Desktop Locker Ransomware NEU SECLAB 20 Dissimilarity Score
  • 24. NEU SECLAB 21 Preparing the Analysis Environment ● UNVEIL is deployed on top of Cuckoo Sandbox - UNVEIL supports all versions of Windows platforms. - Our tool is deployed in Kernel. - Bypassing UNVEIL is not technically easy in user-mode. ● Finding active malware is not easy - We modified some parts of Cuckoo to make it more resilient to environmentally sensitive samples - e.g., fake response to some of the environment checks - Other anti-evasion measures to look more realistic - e.g., defining multiple NTFS drives, changing IP address range and MAC addresses
  • 25. NEU SECLAB 22 Evaluation 1) Detecting known ransomware samples a) Collecting ~3500 ransomware from public repo, Anubis, two security companies. b) 149 benign executables including ransomware-like behavior c) 348 malware samples from 36 malware families Ransomware FamiliesBenign Applications
  • 26. NEU SECLAB 23 Dissimilarity score is different from family to family
  • 27. NEU SECLAB Detecting known ransomware samples The threshold value t = 0.32 gives the highest recall with 100% precision 24
  • 28. NEU SECLAB Evaluation UNVEIL with unknown samples 25 . . .56 UNVEIL-enabled VMs on 8 Servers Ganeti Cluster ~ 1200 malware samples per day
  • 29. NEU SECLAB Evaluation UNVEIL with unknown samples ● We used the same similarity threshold (t = 0.32) for the large scale experiment. ● The incoming samples were acquired from the daily malware feed provided by Anubis from March 18 to February 12, 2016. ● The dataset contained 148,223 distinct samples. 26
  • 30. NEU SECLAB Cross-checking with VirusTotal 27 ● Pollution ratio is defined as the ratio of the number of scanners that identified the sample to the number of scanners in VirusTotal
  • 32. NEU SECLAB Detection: New Ransomware Family 29
  • 33. NEU SECLAB Detection: New Ransomware Family 30 • During our experiments, we discovered a new malware family – We call it “SilentCrypt” – After we reported it, others started detecting it as well – We were not able to find any information about this family online – The ransomware first checks for private files of a user, contacts the C&C server, and starts the attack based on the answer
  • 34. NEU SECLAB Detection: New Ransomware Family 31
  • 35. NEU SECLAB 32 ● Ransomware is a serious threat ● UNVEIL introduces concrete models to detect Ransomware ● Detecting an unknown family shows that the solutions are useful in practice ● We continue to improve functionality tuned towards detecting ransomware Conclusion