the memory remains

45
How do I know I ’m secure?

Upload: nahidul-kibria

Post on 13-Apr-2017

271 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The memory remains

How do I know I’m secure?

Page 2: The memory remains

Are my devices Infected?

Page 3: The memory remains

What if!

Page 4: The memory remains
Page 5: The memory remains

Incident Response

Page 6: The memory remains

What if!?!

Page 7: The memory remains

Or…

Page 8: The memory remains

We need to analyze malware

Page 9: The memory remains

Malware become smarterEncrypted Network Communications(c&c) Persistence (Auto Start) Privilege Escalation (run as admin) Data exfiltration Evades modern antivirus

Page 10: The memory remains

Fileless Malware

Page 11: The memory remains

Case Study

Page 12: The memory remains
Page 13: The memory remains
Page 14: The memory remains

We need a sampleContagio Malware Dump: Free; password required Das Malwerk: Free FreeTrojanBotnet: Free; registration required KernelMode.info: Free; registration required MalShare: Free; registration required Malware.lu’s AVCaesar: Free; registration required MalwareBlacklist: Free; registration required Malware DB: Free Malwr: Free; registration required Open Malware: Free theZoo aka Malware DB: Free Virusign: Free VirusShare: Free

Page 15: The memory remains

Let's get infected

Page 16: The memory remains

Win7x86/64

Page 17: The memory remains

Before infected1.Regshot 2.Memory dump

Page 18: The memory remains

After infectionCompare regshot

Page 19: The memory remains
Page 20: The memory remains
Page 21: The memory remains

But....

Page 22: The memory remains

The memory remains.

Page 23: The memory remains

Memory dumpVmware (Fusion/Workstation/Server/Player) — .vmem = raw memory. (.vmss and .vmsn = contain

memory image) (each snapshot will have its own .vmem file) Microsoft Hyper-V — .bin = raw memory image Parallels — .mem = raw memory image VirtualBox — .sav = partial memory image (Memory file only holds memory actively in use, not the

entire amount of memory assigned to the virtual machine.

Page 24: The memory remains

Volatility

Page 25: The memory remains
Page 26: The memory remains
Page 27: The memory remains
Page 28: The memory remains
Page 29: The memory remains
Page 30: The memory remains
Page 31: The memory remains
Page 32: The memory remains

Shellcode loading….

Page 33: The memory remains

But....

Page 34: The memory remains

The memory remains.

Page 35: The memory remains
Page 36: The memory remains
Page 37: The memory remains
Page 38: The memory remains
Page 39: The memory remains
Page 40: The memory remains
Page 41: The memory remains

vol.py -f afterinfected.raw --profile=Win7SP1x86 printkey --key="Software\Microsoft\Windows\CurrentVersion\Run" vol.py -f afterinfected.raw --profile=Win7SP1x86 pslist vol.py -f afterinfected.raw --profile=Win7SP1x86 malfind -p 3312 vol.py -f infected.raw --profile=Win7SP1x86 envars -p 3276 vol.py -f infected.raw --profile=Win7SP1x86 hivedump -o 0x8ced15c0 vol.py -f infected.raw --profile=Win7SP1x86 hivelist

Page 42: The memory remains

Yara

Page 43: The memory remains

dump the memory.

Page 44: The memory remains
Page 45: The memory remains

Writing code for fun and food. Security enthusiastic.

@nahidupaNahidul Kibria

Co-Founder, Beetles