427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet284/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   280   281   282   283   284   285   286   287   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
350
Chapter 10 • Using Sandbox Tools for Botnets
427_Botnet_10.qxd 1/9/07 3:06 PM Page 350


network-boot system. For more information on DeepFreeze visit
www.faronics.com/html/deepfreeze.asp.
Figure 10.3
Automated Analysis Suite (AAS)
Notes from the Underground…
Detecting a Virtual Machine
Using virtual machines for malware analysis has become very popular
today due to that fact a lot of malicious applications try to detect if they
are running in such a virtual environment. Depending on the virtualiza-
tion software, the malware can check for different characteristics,
including specific registry entries, the list of running processes or system
services, or typical system behavior. Especially for the often used product
VMWare, there are many public known detection methods. The site
www.trapkit.de presents a lot of them and offers the tools 
scoopy doo
and 
jerry
for that purpose. A generic approach to VM detection has been
www.syngress.com
Using Sandbox Tools for Botnets • Chapter 10
351
Nepenthes 
Sensor 1
Database with
M alware Binaries
and Analyses
Nepenthes 
Sensor 2
Nepenthes 
Sensor n
Virtual 
M achine
H ost 1
Virtual 
M achine
H ost m
CWSandbox
H ost m.nm
...
...
Web
Interface
Web Server
...
CWSandbox
Host 1.n1
CWSandbox
Host 1.2
CWSandbox
Host 1.1
Continued
427_Botnet_10.qxd 1/9/07 3:06 PM Page 351


presented by Joanna Rutkowska under the name 
redpill
. It is based on
retrieving the address of the 
Interrupt Descriptor Table (IDT)
, a nonprivi-
leged instruction that also can be called from user mode applications.
Because the IDT address retrieved when running in a virtual machine is
different from that in a real system, we can easily use this for VM detec-
tion. The best thing about this trick is that it works with any virtualiza-
tion software. As newer CPU generations offer real virtualization
support, we can only hope that in future VM detection will become
impossible or at least (and most probable) much more difficult.
Describing the Components
In this section we describe the functionality and components of CWSandbox
in detail.The sandbox itself consists of two different executables: cwsandbox.exe
and cwmonitor.dll.The first one is the main application, which starts the mal-
ware and controls the whole analysis process, and the second one is a 
dynamic
link library (DLL),
which is injected into all monitored processes. During the
execution of the malware, the DLL intercepts at each critical API call and
informs the main application of it. Depending on the type of system call, it
either waits for the sandbox to decide how to continue, delegates control to the
originally called API function, or simply returns to the malware with a simu-
lated or error result. Besides monitoring, the DLL also has to ensure that when-
ever the malware starts a new process or injects code into an already running
one, the sandbox is informed of that. In that case a new instance of the DLL is
injected into that newly created or already existing process, so that this process
also can be monitored. A schematic of this architecture is given in Figure 10.4.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   280   281   282   283   284   285   286   287   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish