Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Researcher Offers Malware Analysis Tool

Proof-of-concept tool is more difficult for hackers to detect and evade than current malware analyzers

The problem with hunting for malware is that most currently available analysis tools tip off the attacker that you're doing it. But at next month's Black Hat conference, a researcher will release a tool that is harder to detect -- and harder to avoid -- than the malware analyzers currently on the market.

Paul Royal, principal researcher at botnet hunter Damballa Inc., will make, on Aug. 6, a Black Hat presentation on a tool called Azure, which will be published as an open-source proof of concept, available for free to enterprises or vendors.

Azure is an external analysis tool that is based on Intel VT, a hardware-assisted means of virtualizing the PC. It allows the user to create the equivalent of an x86 processor-based environment that can be used to detect and analyze malware at the instruction level or at the Windows native API level.

The Intel VT-based approach will be harder to detect and evade than currently available malware analysis approaches, Royal says. Today, most analyzers rely on a debugger-based approach that directly instrument malicious programs. However, many malware authors now have methods for detecting these "in-guest" sandboxes and avoiding them, he observes.

Other malware analyzers, such as QEMU, emulate the x86 hardware beneath the operating system, which make them more difficult for hackers to detect. However, in order to operate, these tools generally require full-system emulation, and the emulated systems don't run quite the same way that "live" PCs do. Increasingly, attackers are able to detect the behavior of emulated systems and set their malware to exit before it's captured by the analyzer.

Azure uses Intel VT, which operates outside the operating system but doesn't require full-system emulation, Royal says. Instead, it creates a sandbox with an "equivalent" physical processor that can be safely infected with malware for analysis without tipping off the malware that it's attacking a virtual environment.

Royal tested Azure against Saffron, which uses the in-guest approach, and Renovo, which uses full-system emulation. In the tests, all three tools attempted to identify program code that was hidden using 15 popular "packing" tools, which are used to obfuscate malicious applications. In the end, Azure was the only one of the three that was able to uncover the program code in all 15 cases.

"It's a new way of going after this issue," Royal says.

An attacker could build an exploit that is set to detect hardware virtualization, Royal concedes. But once virtualization has been turned on, subsequent programs can't turn it on again, so it would be difficult for malware to take advantage of such an exploit, he says.

"If they took that approach, they'd actually be shrinking the number of potential targets," he says.

Royal has prepared a white paper that describes his proof of concept and will be publishing code as well. Neither the paper nor the POC will be posted on the Web until the first week of August.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Damballa Inc.
  • Intel Corp. (Nasdaq: INTC) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    HackerOne Drops Mobile Voting App Vendor Voatz
    Dark Reading Staff 3/30/2020
    Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
    Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    State of Cybersecurity Incident Response
    State of Cybersecurity Incident Response
    Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-11547
    PUBLISHED: 2020-04-05
    PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
    CVE-2020-11548
    PUBLISHED: 2020-04-05
    The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
    CVE-2020-11542
    PUBLISHED: 2020-04-04
    3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.
    CVE-2020-11533
    PUBLISHED: 2020-04-04
    Ivanti Workspace Control before 10.4.30.0, when SCCM integration is enabled, allows local users to obtain sensitive information (keying material).
    CVE-2020-11529
    PUBLISHED: 2020-04-04
    Common/Grav.php in Grav before 1.6.23 has an Open Redirect.