skip to main content
10.1145/2076732.2076790acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

BareBox: efficient malware analysis on bare-metal

Published:05 December 2011Publication History

ABSTRACT

Present-day malware analysis techniques use both virtualized and emulated environments to analyze malware. The reason is that such environments provide isolation and system restoring capabilities, which facilitate automated analysis of malware samples. However, there exists a class of malware, called VM-aware malware, which is capable of detecting such environments and then hide its malicious behavior to foil the analysis. Because of the artifacts introduced by virtualization or emulation layers, it has always been and will always be possible for malware to detect virtual environments.

The definitive way to observe the actual behavior of VM-aware malware is to execute them in a system running on real hardware, which is called a "bare-metal" system. However, after each analysis, the system must be restored back to the previous clean state. This is because running a malware program can leave the system in an instable/insecure state and/or interfere with the results of a subsequent analysis run. Most of the available state-of-the-art system restore solutions are based on disk restoring and require a system reboot. This results in a significant downtime between each analysis. Because of this limitation, efficient automation of malware analysis in bare-metal systems has been a challenge.

This paper presents the design, implementation, and evaluation of a malware analysis framework for bare-metal systems that is based on a fast and rebootless system restore technique. Live system restore is accomplished by restoring the entire physical memory of the analysis operating system from another, small operating system that runs outside of the target OS. By using this technique, we were able to perform a rebootless restore of a live Windows system, running on commodity hardware, within four seconds. We also analyzed 42 malware samples from seven different malware families, that are known to be "silent" in a virtualized or emulated environments, and all of them showed their true malicious behavior within our bare-metal analysis environment.

References

  1. M. Labs, "Mcafee threats report: First quarter 2011," McAfee, Tech. Rep., 2011. {Online}. Available: https://secure.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2011.pdfGoogle ScholarGoogle Scholar
  2. T. Raffetseder, C. Kruegel, and E. Kirda, "Detecting system emulators."Google ScholarGoogle Scholar
  3. P. Ferrie, "Attacks on virtual machine emulators," Symantec Corporation, Tech. Rep., 2007.Google ScholarGoogle Scholar
  4. G. Pék, B. Bencsáth, and L. Buttyán, "nether: in-guest detection of out-of-the-guest malware analyzers," in Proceedings of the Fourth European Workshop on System Security, ser. EUROSEC '11. New York, NY, USA: ACM, 2011, pp. 3:1--3:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Rutkowska, "Red pill... or how to detect vmm using (almost) one cpu instruction," 2004. {Online}. Available: http://invisiblethings.org/papers/redpill.htmlGoogle ScholarGoogle Scholar
  6. A. Dinaburg, P. Royal, M. Sharif, and W. Lee, "Ether: malware analysis via hardware virtualization extensions," in Proceedings of the 15th ACM conference on Computer and communications security, ser. CCS '08. New York, NY, USA: ACM, 2008, pp. 51--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Royal, "Alternative medicine: The malware analyst's blue pill," Aug 2008.Google ScholarGoogle Scholar
  8. T. Garfinkel, K. Adams, A. Warfield, and J. Franklin, "Compatibility is Not Transparency: VMM Detection Myths and Realities," in Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS-XI), May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. "Qwmu open source processor emulator." {Online}. Available: http://wiki.qemu.org/Google ScholarGoogle Scholar
  10. "Anubis: Analyzing unknown binaries." {Online}. Available: http://anubis.iseclab.org/Google ScholarGoogle Scholar
  11. R. Paleari, L. Martignoni, G. Fresi Roglia, and D. Bruschi, "A fistful of red-pills: How to automatically generate procedures to detect CPU emulators," in Proceedings of the 3 rd USENIX Workshop on Offensive Technologies (WOOT). Montreal, Canada: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna, "Efficient Detection of Split Personalities in Malware," in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2010.Google ScholarGoogle Scholar
  13. M. G. Kang, H. Yin, S. Hanna, S. McCamant, and D. Song, "Emulating emulation-resistant malware," EECS Department, University of California, Berkeley, Tech. Rep., May 2009.Google ScholarGoogle Scholar
  14. B. Lau and V. Svajcer, "Measuring virtual machine detection in malware using dsd tracer," Journal in Computer Virology, vol. 6, pp. 181--195, 2010, 10.1007/s11416-008-0096-y.Google ScholarGoogle ScholarCross RefCross Ref
  15. "Juzt-reboot." {Online}. Available: http://www.juzt-reboot.com/Google ScholarGoogle Scholar
  16. "Partimage." {Online}. Available: http://www.partimage.org/Google ScholarGoogle Scholar
  17. R. Hund, T. Holz, and F. C. Freiling, "Return-oriented rootkits: bypassing kernel code integrity protection mechanisms," in Proceedings of the 18th conference on USENIX security symposium, ser. SSYM'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 383--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. "Intel®64 and ia-32 architectures software developer's manual." {Online}. Available: http://www.intel.com/Assets/PDF/manual/325384.pdfGoogle ScholarGoogle Scholar
  19. "Fast memory copy." {Online}. Available: http://now.cs.berkeley.edu/Td/bcopy.htmlGoogle ScholarGoogle Scholar
  20. X. Jiang, X. Wang, and D. Xu, "Stealthy malware detection and monitoring through vmm-based "out-of-the-box" semantic view reconstruction," ACM Trans. Inf. Syst. Secur., vol. 13, pp. 12:1--12:28, March 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, "Towards an Understanding of Anti-Virtualization and Anti-Debugging Behavior in Modern Malware," in Proceedings of the 38th Annual IEEE International Conference on Dependable Systems and Networks (DSN '08), Anchorage, Alaska, USA, June 2008, pp. 177--186.Google ScholarGoogle Scholar
  22. N. Xiong, Y. Zhou, H. Liu, and Y. Zhang, "Avmm: Virtualize client with a bare-metal and asymmetric partitioning approach," Submitted, ICC 2011, Tech. Rep., 2011.Google ScholarGoogle Scholar
  23. A. Depoutovitch and M. Stumm, "Otherworld: giving applications a chance to survive os kernel crashes," in EuroSys, 2010, pp. 181--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. K. Kourai, "Cachemind: Fast performance recovery using a virtual machine monitor," in Dependable Systems and Networks Workshops (DSN-W), 2010 International Conference on, 28 2010-july 1 2010, pp. 86--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Kourai, "Fast and correct performance recovery of operating systems using a virtual machine monitor," in Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, ser. VEE '11. New York, NY, USA: ACM, 2011, pp. 99--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Baker and M. Sullivan, "The recovery box: Using fast recovery to provide high availability in the unix environment," in In Proceedings USENIX Summer Conference, 1992, pp. 31--43.Google ScholarGoogle Scholar
  27. "Norman sandbox analyzer." {Online}. Available: http://www.norman.com/products/sandbox_analyzer/enGoogle ScholarGoogle Scholar

Index Terms

  1. BareBox: efficient malware analysis on bare-metal

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
          December 2011
          432 pages
          ISBN:9781450306720
          DOI:10.1145/2076732

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 December 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate104of497submissions,21%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader