{"id":16163,"date":"2019-08-26T02:30:18","date_gmt":"2019-08-26T10:30:18","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/26\/news-9906\/"},"modified":"2019-08-26T02:30:18","modified_gmt":"2019-08-26T10:30:18","slug":"news-9906","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/26\/news-9906\/","title":{"rendered":"A honeytrap for malware"},"content":{"rendered":"<p><strong>Credit to Author: Eugene Kaspersky| Date: Mon, 26 Aug 2019 10:09:10 +0000<\/strong><\/p>\n<p>I haven&#8217;t seen the sixth\u00a0<em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mission:_Impossible_%2525E2%252580%252593_Fallout\" target=\"_blank\" rel=\"noopener noreferrer\">Mission Impossible<\/a><\/em>\u00a0movie, and I don&#8217;t think I will. I sat through the fifth \u2014 in suitably zombified state, returning home on a long-haul flight after a tough week&#8217;s business \u2014 but only because one scene in it was shot in our shiny new modern\u00a0<a href=\"https:\/\/eugene.kaspersky.com\/2015\/09\/03\/mission-impossible-5-in-klondon\/\" target=\"_blank\" rel=\"noopener noreferrer\">London office<\/a>. And that was one <em>Mission Impossible<\/em> installment too many, really. Nope \u2014 not for me. Slap, bang, smash, crash, pow, wow. Oof. Nah, I prefer\u00a0<a href=\"https:\/\/eugene.kaspersky.com\/tag\/evening-poster\/\" target=\"_blank\" rel=\"noopener noreferrer\">something<\/a>\u00a0a little more challenging, thought-provoking and just plain interesting. After all, I have precious little time as it is!<\/p>\n<p>I really am giving Tom Cruise and Co. a major dissing here, aren&#8217;t I? But hold on. I have to give them their due for at least one scene done really rather well (i.e., thought-provoking and plain interesting!). It&#8217;s the one where the good guys need to get a bad guy to rat on his bad-guy colleagues, or something like that. So they set up a fake environment in a &#8220;hospital&#8221; with &#8220;CNN&#8221; on the &#8220;TV&#8221; broadcasting a news report about atomic Armageddon. Suitably satisfied his apocalyptic manifesto has been broadcast to the world, the baddie gives up his pals (or was it a login code?) in the deal arranged with his interrogators. Oops.\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=hhLIwmgx3vI\" target=\"_blank\" rel=\"noopener noreferrer\">Here&#8217;s the clip<\/a>.<\/p>\n<p>Why do I like this scene so much? Because, actually, it demonstrates really well one of the methods of detecting \u2026 previously unseen cyberthreats! There are in fact many such methods \u2014 they vary depending on area of application, effectiveness, resource use, and other parameters (I\u00a0<a href=\"https:\/\/eugene.kaspersky.com\/tag\/technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">write<\/a>\u00a0about them regularly here). But one always seems to stand out:\u00a0<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/emulation\/\" target=\"_blank\" rel=\"noopener noreferrer\">emulation<\/a>\u00a0(about which I&#8217;ve also written\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/emulator-technology\/27070\/\" target=\"_blank\" rel=\"noopener noreferrer\">plenty<\/a>\u00a0here before).<\/p>\n<p>As in the <em>MI<\/em> movie, an emulator launches the object being investigated in an isolated, artificial environment, which encourages it to reveal its maliciousness.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/26060715\/kaspersky-sandbox-patent-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-28111\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/08\/26060715\/kaspersky-sandbox-patent-featured.jpg\" alt=\"\" width=\"1460\" height=\"960\" \/><\/a><br \/> But there&#8217;s one serious downside to such an approach \u2014 the very fact that the environment is artificial. The emulator does its best to make that artificial en\u0440\u0438\u0432\u0435\u0442a real OS.<\/p>\n<p>On the other hand, there&#8217;s another option for tackling the behavioral analysis of suspicious objects: analysis \u2014 on a\u00a0<em>real<\/em>\u00a0operating system \u2014 one on a virtual machine. Well, why not? If the emulator never quite fully cuts it, let a real, albeit virtual, machine have a go! It would be the ideal &#8220;interrogation&#8221; \u2014 conducted in a real environment, not an artificial one, but with no real negative consequences.<\/p>\n<p>On hearing about this concept, some may rush to ask why no one thought of it before. After all, virtualisation has been in the tech-mainstream since 1992. Well, as it turns out, it&#8217;s not so simple.<\/p>\n<p>First, analyzing suspicious objects in a virtual machine is a resource-intensive process, suited only to heavyweight enterprise-grade security solutions, where scanning needs to be super-intensive so that absolutely zero maliciousness gets through the defenses. Alas, for home computers, let alone smartphones, this technology isn&#8217;t suitable \u2014 yet.<\/p>\n<p>Second, such things actually do exist. In fact, we already use this technology \u2014 internally, here at the\u00a0<em>K<\/em>ompany \u2014 for internal investigations. But in terms of market-ready products, not many are available yet. Competitors have released similar products, but their effectiveness leaves a lot to be desired. As a rule, such products are limited to just collecting logs and basic analysis.<\/p>\n<p>Third, launching a file on a virtual machine is just the beginning of a very long and tricky process. After all, the aim of the exercise is to have the maliciousness of an object reveal itself, and for that you need a smart hypervisor, behavior logging and analysis, constant fine-tuning of the templates of dangerous actions, protection from anti-emulation tricks, execution optimization, and much more.<\/p>\n<p>Here I can say without false modesty that we truly are way ahead \u2014 of the whole planet!<\/p>\n<p>Recently we were granted a U.S. patent (<a href=\"https:\/\/pdfpiw.uspto.gov\/.piw?PageNum=0&amp;docid=10339301\" target=\"_blank\" rel=\"noopener noreferrer\">US10339301<\/a>) covering the creation of a suitable environment for a virtual machine for conducting deep, rapid analysis of suspicious objects. Here&#8217;s how it works:<\/p>\n<ul>\n<li>Virtual machines are created (for different types of objects) with settings that ensure both their optimal execution and a maximally high detection rate.<\/li>\n<li>The hypervisor of a virtual machine works in tandem with system logging of an object&#8217;s behavior and system analysis thereof, helped by updatable databases of templates of suspicious behavior, heuristics, the logic of reactions to actions, and more.<\/li>\n<li>Should suspicious actions be detected, the analysis system enters on-the-fly changes to the process of execution of the object on a virtual machine to encourage the object to show its malicious intentions. For example, the system can create files, amend the registry, speed up time, and so on.<\/li>\n<\/ul>\n<p>That last point \u2014 the third \u2014 is the most unique and delicious feature of our technology. Let me give you an example to show you how it works.<\/p>\n<p>The system detects a launched file has &#8220;fallen asleep&#8221; and no longer manifests any activity. That&#8217;s because the object can be programmed to quietly do nothing for several (dozen) minutes (hours) until the beginning of malicious activity. When it starts its do-nothing thing, we speed up time on-the-fly inside the virtual machine so that it passes one, three, five and up to a gazillion minutes per second. The functionality of the file being analyzed doesn&#8217;t change, while the time of the wait is lowered by hundreds (or thousands) of times. And if, after its &#8220;snooze,&#8221; the malware decides to check the system clock (has it been ticking?), it will be fooled into thinking it has, and continue with its malicious mission \u2014 exposing itself in the process.<\/p>\n<p>Another example:<\/p>\n<p>The object uses a vulnerability in a specific library or tries to change the contents of a file or registry. At first, with the help of the regular\u00a0<em>fopen()<\/em>\u00a0function, it tries to open the library (or file or registry), and if it fails to do so (there&#8217;s no library, or no access rights to the file) \u2014 then it simply gives up. In such a scenario we change (on the fly) the return value of the\u00a0<em>fopen()<\/em>\u00a0function from &#8220;file absent&#8221; to &#8220;file exists&#8221; (or, if necessary, we create the file itself and fill it with appropriate content), then we simply observe what the object does.<\/p>\n<p>Such an approach also works really well in conditions of logic trees of an object&#8217;s behavior. For example: if there exist file A and file B, then file C is modified and the job&#8217;s finished. However, it&#8217;s not known what the program being investigated will do if only one of either file A or file B exists. Therefore, we launch an iteration in parallel and tell the suspect program that file A exists but B doesn&#8217;t, then we analyze the further logic-tree activity.<\/p>\n<p>What&#8217;s important to note is that the rules of reaction to execution of the file are configured by external, easily updatable databases. You don&#8217;t need to redevelop the whole engine to add new logic, just correctly describe the multitude of possible scenarios of malicious behavior and perform a one-click update.<\/p>\n<p>And that, in a nutshell, is how this technology works. It will soon be added to\u00a0<a href=\"https:\/\/eugene.kaspersky.com\/2016\/03\/16\/the-big-picture\/\" target=\"_blank\" rel=\"noopener noreferrer\">KATA<\/a>, and also delivered to the market as a stand-alone solution for enterprise,\u00a0<a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/sandbox\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Sandbox<\/a>.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-sandbox-patent\/28110\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Eugene Kaspersky| Date: Mon, 26 Aug 2019 10:09:10 +0000<\/strong><\/p>\n<p>Eugene Kaspersky explains how Kaspersky Sandbox uses virtual machines to thoroughly examine malware\u2019s behavior.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[11029,1001,12177,16280,22725,22726,18052,22727],"class_list":["post-16163","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-apt","tag-business","tag-enterprise","tag-kaspersky-anti-targeted-attack","tag-kaspersky-sandbox","tag-kata","tag-sandbox","tag-targeted-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16163"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16163\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16163"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}