Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Researcher Offers Malware Analysis Tool

Proof-of-concept tool is more difficult for hackers to detect and evade than current malware analyzers

The problem with hunting for malware is that most currently available analysis tools tip off the attacker that you're doing it. But at next month's Black Hat conference, a researcher will release a tool that is harder to detect -- and harder to avoid -- than the malware analyzers currently on the market.

Paul Royal, principal researcher at botnet hunter Damballa Inc., will make, on Aug. 6, a Black Hat presentation on a tool called Azure, which will be published as an open-source proof of concept, available for free to enterprises or vendors.

Azure is an external analysis tool that is based on Intel VT, a hardware-assisted means of virtualizing the PC. It allows the user to create the equivalent of an x86 processor-based environment that can be used to detect and analyze malware at the instruction level or at the Windows native API level.

The Intel VT-based approach will be harder to detect and evade than currently available malware analysis approaches, Royal says. Today, most analyzers rely on a debugger-based approach that directly instrument malicious programs. However, many malware authors now have methods for detecting these "in-guest" sandboxes and avoiding them, he observes.

Other malware analyzers, such as QEMU, emulate the x86 hardware beneath the operating system, which make them more difficult for hackers to detect. However, in order to operate, these tools generally require full-system emulation, and the emulated systems don't run quite the same way that "live" PCs do. Increasingly, attackers are able to detect the behavior of emulated systems and set their malware to exit before it's captured by the analyzer.

Azure uses Intel VT, which operates outside the operating system but doesn't require full-system emulation, Royal says. Instead, it creates a sandbox with an "equivalent" physical processor that can be safely infected with malware for analysis without tipping off the malware that it's attacking a virtual environment.

Royal tested Azure against Saffron, which uses the in-guest approach, and Renovo, which uses full-system emulation. In the tests, all three tools attempted to identify program code that was hidden using 15 popular "packing" tools, which are used to obfuscate malicious applications. In the end, Azure was the only one of the three that was able to uncover the program code in all 15 cases.

"It's a new way of going after this issue," Royal says.

An attacker could build an exploit that is set to detect hardware virtualization, Royal concedes. But once virtualization has been turned on, subsequent programs can't turn it on again, so it would be difficult for malware to take advantage of such an exploit, he says.

"If they took that approach, they'd actually be shrinking the number of potential targets," he says.

Royal has prepared a white paper that describes his proof of concept and will be publishing code as well. Neither the paper nor the POC will be posted on the Web until the first week of August.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Damballa Inc.
  • Intel Corp. (Nasdaq: INTC) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
    Robert Lemos, Contributing Writer,  2/20/2020
    Ransomware Damage Hit $11.5B in 2019
    Dark Reading Staff 2/20/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    How Enterprises Are Developing and Maintaining Secure Applications
    How Enterprises Are Developing and Maintaining Secure Applications
    The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2018-19668
    PUBLISHED: 2020-02-27
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-17963. Reason: This candidate is a reservation duplicate of CVE-2018-17963. Notes: All CVE users should reference CVE-2018-17963 instead of this candidate. All references and descriptions in this candidate have been removed to preve...
    CVE-2019-12882
    PUBLISHED: 2020-02-27
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    CVE-2017-6363
    PUBLISHED: 2020-02-27
    ** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says "In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for...
    CVE-2017-6371
    PUBLISHED: 2020-02-27
    Synchronet BBS 3.16c for Windows allows remote attackers to cause a denial of service (service crash) via a long string in the HTTP Referer header.
    CVE-2017-5861
    PUBLISHED: 2020-02-27
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-1000020. Reason: This candidate is a reservation duplicate of CVE-2017-1000020. Notes: All CVE users should reference CVE-2017-1000020 instead of this candidate. All references and descriptions in this candidate have been removed to...