Malware Memory And Network Forensics

Transcription

Malware Memory And Network Forensics
IJSART - volume
1 Issue 3 –MARCH 2015
ISSN [ONLINE]: 2395-1052
Malware Memory And Network Forensics
Rushita Dave1, Darsh Patel2, Anisetti Anjaneyulu3
1
Digital Forensics Analyst esF Labs Ltd.
Abstract- This paper presents a malware behaviourin different
states of computers that are infected by malicious codes or
signatures. Malicious programs spy on users' behavior and
compromise their privacy. Malicious information access and
processing behavior is the fundamental trait of numerous
malware categories breaching users' privacy (including key
loggers, password thieves, network sniffers, stealth backdoors,
spyware and rootkits), which comes from malicious binary codes.
In this paper introduce malware behavior in network and
memory of suspect system. This malware forensic analysis done
using all memory processes & network activities. These all
processes can help for Memory analysis identify malicious code
and explain how the specimen was used on the suspect system.
Index Terms- MSF Encode, Trojan Binary Signature, Exe File
Carving, Process Dump Analysis, Credential Analysis In Memory
Dump
I.
INTRODUCTION
A program that is designed to carry out malicious
operation is known as malware, which is a term short for
“malicious software”. If the initiator of a program is malicious,
then they can abuse the supremacy available to the program to
carry out malicious exertion.
Depending on the access control systems in place, which
restrict what each user is authorize to do, the program will
typically be able to misuse the authority of the user that runs the
program. If the code is run by a end user, then it typically has
explosion to all of the user’s personal files, and if it manipulate to
be run by a superuser (root/Administrator), then it can typically
make changes to any aspect of the system, including replacing
other programs and deleting achieve files.
A striker just needs to find achieve way to get the
malware onto a victim’s computer.
II. USING MSF TO CREATE TROJAN OPERABLE
The Metasploit framework (MSF) is one of the most
powerful tools in an ethicalhacker’s software collection. MSF
contains an immense library of exploits and a framework for
developing exploits, as well as numerous other security features,
such as tools for information gathering.
Page | 38
A payload refers to the malicious code that we want to run
on a victim’ssystem. Metasploit comes with a huge collection of
different kinds of payloads that it can generate.
Fig.1 - MSF Payload for encode
For creating a Trojan horse that simply adds a new user to
a victim’s Windows system.that there are a number of structure
options, along with their absence values.The above command will
check the password for complexity requirements, and confirm the
settings will be applied correctly.
Executed will result in attacker’s payload: a new user will be added
to the system.To generate a C code version, simply append “C”.
Fig.2 - Binary Signature of Trojan
For creating a Trojan horse, the next step is to create an
executable program that will actually run this code. To do this we
specify “X” as attacker’s output type, and sendthe result to a new
file.This has generated a windows executable incurrentdirectory.
www.ijsart.com
IJSART - volume
1 Issue 3 –MARCH 2015
Fig.3 - Payload of exe file
Start a Web server to share Trojan.Start by creating a directory to
place user files:
Copy new Trojan to this location.cpGame.exe /var/www/share/
Start the Apache Web server:
ISSN [ONLINE]: 2395-1052
system, registry, and provides the mastery to ascertain investigative
leads that have been unbeknownst to most cyber forensics analysts.
Malicious nemesis have been controlling this knowledge disparity
to undermine many aspects of the digital investigation process with
such things as anti-forensics expertise, memory resident malware,
kernel rootkits, encryption (file systems, network packet traffic,
etc), and Trojan denial. The only way to turn-the-tables and defeat
a creative digital human adversary is through talented analysts.
LIVE ANALYSIS
Fig.4 - Shared .exe File
Run the Trojan horse and just downloaded in the
Windows VM.Open a command prompt and view a list of the
users on the system.the Trojan has done its activity and a new
Administrator user exists on the Windows system.it known as user
ESF.
Full content packet captures can provide valuable insight
into an analysis or investigation. Depending on the installation of
the capture mechanism an analyst is sometimes able to recreate an
exact timeline of events between two or additional hosts. A key
component of this method is being able to replicate content
transferred between hosts based solely on the packet traffic
capture. With a full content packet data capture it is possible to
extract a bit-for-bit copy of files transferred between hosts across
many application-layer protocols,TCP and UDP based.
In the live detection of malware wireshark capture exe
file(Game.exe) in packet no:7& also capture Source ip address &
destination ip address..in the frame section there is destination ip
address(192.168.0.45) which known as attacker’s ip of kali Linux
platform.
Fig.5 - New User (ESF) created by .exe
Targeted attacks or what have come to be known as
“advanced persistent threats (APTs)” are extremely successful.
However, instead of focusing on the attack methods and effects to
improve network defenses, many seem more concerned with
debating whether they are “advanced” or not from a technical
perspective.
The ability to perform digital investigations and incident
response is becoming a critical skill for many occupations.
Regrettably,digital examiner frequently lack the training or
experience to take advantage of the volatile artifacts found in
physical memory. Volatile memory contains precious information
about the runtime state of the system, provides the ability to link
sediments from traditional forensic analysis like network, file
Page | 39
Fig.6 - .Exe Packet of Source IP
In the other technique for malware analysis there is one
function in wireshark which known as expert info..In this function
www.ijsart.com
IJSART - volume
1 Issue 3 –MARCH 2015
ISSN [ONLINE]: 2395-1052
there are packet details.in details capture particular packet of exe
file which is share from attacker’s platform.
Fig.7 - Expert Info Detail Packet
This will demonstrate a simple method of extracting an
executable transferred across an FTP session identified in a packet
traffic capture. The only tool needilable is Wireshark which is
freely available for Mac, Linux, and Windows platforms. There are
tools available which automate this operation in many scenarios,
but forensic analysts should perceive the centraling concepts so, in
the case that an automated tool falls short, files can be separate
manually.
Other technique for live malware detection in network
miner first capture packets .In the analysis section detect direct
link of exe file & found where particular exe stored in victim
system which known as reconstruction file path.
Fig.9 - Attacker’s Platform Information
DEAD ANALYSIS
This paper walks through the analysis of an application
hang caused by a chain of RPC calls. The first part of the paper
discusses the manually generated application memory dump (user
mode dump) and the second part focuses on the manually
generated kernel mode dump (complete memory dump).first take
process dump of victim browser.In analysis time found the
destination path with ipaddress (192.168.0.45) & exename
(game.exe) in winhex editor.
There are also detect MAC address of attacker’s
machine,platform,ip address & port connection of TCP protocol.
Fig.10- Shared .Exe File In Memory Dump
With a hex editor, a user can see or edit the raw and exact
contentsof a file,asopposed to the interpretation of the same content
that other, top- level application software may equate with the file
format. For example, this could be raw image data, in contrast to
the way assembling software would interpret and show the same
file.
Fig-8 - Destination Host IP Packet
Page | 40
In the other side found USERNAME & PASSWORD for
user account which set by attacker’s to direct access the user
system.
www.ijsart.com
IJSART - volume
1 Issue 3 –MARCH 2015
ISSN [ONLINE]: 2395-1052
ActiveXcontrols, and other executable file formats that run on MS
Windows 32-bit platforms.
Fig.11 - Credential Of Account User
Have you ever wondered exactly how Windows is
assigning physical memory, how much file contain is cached in
RAM, or how considerable RAM is used by the kernel and device
drivers?RAMMap is an approached physical memory usage
analysis utility for Windows XP and higher.
In the RAMMap found a particular process id is 2072 and session
1 of game.exe file.
Fig.13 - DLL Processes In Dump File
Though anti-virus software is continually getting better, a
very significant percentage ofmalware escapes the automated
screening process. PE Explorer offers an in-depth look atthe inner
workings of downloaded executable files, and helps software
companiesdetermine if a binary is harmful by examining it
manually and without relying on theautomated scanning engines.
Fig.12 - Process ID Of .Exe File
A computer program is a passive collection of
instructions; a process is the actual execution of those instructions.
Several operations may be associated with the same program.
In the process monitor comprehensive event properties
such session IDs and user names, reliable process information, full
thread stacks with integrated symbol support for each operation,
simultaneous logging to a file, and much more.
After analysis of game.exe process found process name,
PID,created file operation,file location path.detail part will show
file attributes,created time,last access time,last write time and
change time.
Reverse engineers within the anti-virus, vulnerability
research and forensics companies facethe challenge of analyzing a
large number of maliciuos software appearing at an incrediblerate.
Software developers look for an effective way to safely inspect and
dissect potentiallyharmful Windows executable files. Meeting this
need, Heaventools offers PE Explorer, anintegrated collection of
tools that provide a framework for working with EXE, DLL,
Page | 41
Fig.14 - User Credential In Processes
PE Explorer canhelp you learn the minimum set of DLL files
required for the EXE file to load and run, andthe complete path to
modules loaded by the EXE file. It is helpful in discovering
missing orinvalid modules, import/export mismatches, circular
dependencies
and
other
module-relatedproblems,
and
introubleshooting system errors caused by theloading or executing
ofmodules.
III.
CONCLUSION
This paper provided a memory level introductionto the
topic of malware analysis, andsome practical techniques and tools
that can be used to conduct limited analysis of Windowsprograms
ofunknown functionality in forensics way.In this chapter two
platforms were used for attack and analysis.In memory forensics
part analyze signature base DLL process,credential of user, and
memory dump tools for malware behaviour and also used network
tools for file carving and live activity of exe using packet analysis.
www.ijsart.com
IJSART - volume
1 Issue 3 –MARCH 2015
ISSN [ONLINE]: 2395-1052
REFERENCES
[1].http://www.solutionary.com/resourcecenter/blog/2012/12/hunting-malware-with-memory-analysis/
[2]http://www.porcupine.org/forensics/forensicdiscovery/chapter6.html
[3]http://as.wiley.com/WileyCDA/WileyTitle/productCd1118825098.html
[4]http://www.tekdefense.com/news/2013/12/3/review-malwareand-memory-forensics-with-volatility.html
[5]http://eforensicsmag.com/download/a-practical-approach-tomalware-memory-forensics-with-eforensics-open/
[6]http://en.wikipedia.org/wiki/Deep_content_inspection
[7]https://community.mcafee.com/docs/DOC-1513
[8]https://www.blackhat.com/presentations/bh-dc07/Kendall_McMillan/Presentation/bh-dc-07Kendall_McMillan.pdf
[9]http://www.hindawi.com/journals/acisc/2014/197961/
[10]http://scholar.google.co.in/scholar?q=malware+NETWORK+
ANALYSIS&hl=en&as_sdt=0&as_vis=1&oi=scholart&sa=X&e
i=qYrAVP3iHYHM8gWE3YLYCA&ved=0CB0QgQMwAA
Page | 42
www.ijsart.com