The search functionality is under construction.
The search functionality is under construction.

Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection

Katsunari YOSHIOKA, Tsutomu MATSUMOTO

  • Full Text Views

    0

  • Cite this

Summary :

Malware sandbox analysis, in which a malware sample is actually executed in a testing environment (i.e. sandbox) to observe its behavior, is one of the promising approaches to tackling the emerging threats of exploding malware. As a lot of recent malware actively communicates with remote hosts over the Internet, sandboxes should also support an Internet connection, otherwise important malware behavior may not be observed. In this paper, we propose a multi-pass sandbox analysis with a controlled Internet connection. In the proposed method, we start our analysis with an isolated sandbox and an emulated Internet that consists of a set of dummy servers and hosts that run vulnerable services, called Honeypots in the Sandbox (HitS). All outbound connections from the victim host are closely inspected to see if they could be connected to the real Internet. We iterate the above process until no new behaviors are observed. We implemented the proposed method in a completely automated fashion and evaluated it with malware samples recently captured in the wild. Using a simple containment policy that authorizes only certain application protocols, namely, HTTP, IRC, and DNS, we were able to observe a greater variety of behaviors compared with the completely isolated sandbox. Meanwhile, we confirmed that a noticeable number of IP scans, vulnerability exploitations, and DoS attacks are successfully contained in the sandbox. Additionally, a brief comparison with two existing sandbox analysis systems, Norman Sandbox and CWSandbox, are shown.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E93-A No.1 pp.210-218
Publication Date
2010/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E93.A.210
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Application

Authors

Keyword