首页> 外文会议>Annual IEEE India Conference >Event triggered malware: A new challenge to sandboxing
【24h】

Event triggered malware: A new challenge to sandboxing

机译:事件触发的恶意软件:沙盒的新挑战

获取原文

摘要

Over the years cyber attacks have turned more sophisticated, directed and lethal. In the recent times attackers have found new means to bypass advanced and sophisticated methods like sandboxing. Sandboxes emulate and analyze behavior and network in an isolated environment. Forensic investigations are performed by combining static analysis with sandbox analysis. The limitation with sandboxing is simulating Human Computer Interaction (HCI) and this is best used by malware writers for advanced threat models. Malware analysis using sandboxing is no longer considered a robust technique. This paper aims to evaluate the effectiveness of sandboxing and evasion techniques used by malwares to evade them. For this analysis we have used Trojan Upclicker which uses HCI for its injection and execution. Malware analysis was performed on sandboxes like Malwr, Anubis and a commercial sandbox based on the parameters like files created or modified, registry changes, running processes, memory mapping, network connections to outside domains, signatures and operating system changes. While Anubis failed to find any irregularity in the malware sample, Malwr was able to diagnose it as a malware. The commercial off the shelf sandbox gave comprehensive detailed results. Through this we conclude that though sandboxing is a better and less complex way of analyzing samples, it still does not assure a pinnacle spot in malware analysis. Nefarious individuals are cognizant of this shortcoming of sandboxes and are smartly developing more evading malwares. Efforts need to be put to make these sandboxes simulate HCI events more efficiently.
机译:多年来,网络攻击已变得更加复杂,直接和致命。近年来,攻击者发现了新的方法来绕过沙盒等高级和复杂的方法。沙盒可以在隔离的环境中模拟和分析行为和网络。法医调查是通过将静态分析与沙箱分析相结合来进行的。沙箱的局限性在于模拟人机交互(HCI),恶意软件编写者最好将其用于高级威胁模型。使用沙箱进行的恶意软件分析不再被认为是可靠的技术。本文旨在评估恶意软件用来逃避沙箱和逃避技术的有效性。在此分析中,我们使用了Trojan Upclicker,后者使用HCI进行注入和执行。恶意软件分析是根据诸如创建或修改的文件,注册表更改,运行过程,内存映射,与外部域的网络连接,签名和操作系统更改之类的参数在诸如Malwr,Anubis之类的沙箱和商用沙箱上进行的。尽管Anubis未能在恶意软件样本中发现任何违规行为,但Malwr能够将其诊断为恶意软件。现成的沙箱商业广告提供了全面详细的结果。由此得出的结论是,尽管沙箱分析是一种更好且不太复杂的样本分析方法,但它仍无法确保恶意软件分析中的巅峰之作。邪恶的人们意识到沙盒的这种缺点,并正在聪明地开发出更多逃避的恶意软件。需要努力使这些沙箱更有效地模拟HCI事件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号