MalwareAnalysis Report2S17
MalwareAnalysis Report2S17
This document contains information based on research that has been gathered by employee(s) of The Senator
Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily
and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained
in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in
connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage
resulting from use of this data. Information in this report can be downloaded and redistributed by any person or
persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly
annotated.
Contents
Introduction 2
Background 2
Purpose and Scope 2
Terminology 2
Methodology and Methods 3
Equipment Used 3
Results 4
1.1 Fake Flash 4
1.2 DarkComet NJRAT 7
1.3 Hicurdismos ScareWare 10
Conclusion 12
Future Work 13
References 14
Background
This project is being done to give the community an understanding of how malware works, and is a
continuation of a project previously done at the LCDI. We are using their research to move forward with the
project. Last semester Cuckoo Sandbox, an open-source analysis environment, was used to analyze malware.
Unfortunately, a sample of malware managed to escape that sandbox and out onto the LCDI network. For this
reason, we are using the AWS environment.
Research Questions
1. Given a piece of malware, what type of information can be discovered using different forms of malware analysis?
2. Is Amazon EC2 able to supply a safe environment to analyze malware in?
3. Is ThreatAnalyzer able to successfully analyze all samples of malware?
4. Is the information gathered from ThreatAnalyzer relevant in understanding malware?
Terminology
Amazon WorkSpaces (AWS) - Amazon WorkSpaces is a fully managed, secure desktop computing service
which runs on the AWS cloud. Amazon WorkSpaces allows you to easily provision cloud-based virtual
desktops and provide your users access to the documents, applications, and resources they need from any
supported device, including Windows and Mac computers, Chromebooks, iPads, Fire tablets, Android tablets,
and Chrome and Firefox web browsers. (Amazon)
Static Analysis - Static Analysis is a term referring to when computer code is examined without executing the
program in order to gain an understanding of the content and capability of the code. When static analysis is
Malware Analysis Page 2 of 15
done by an automated tool, the code is parsed and identifiable content is reported in a human readable format.
(Rouse)
Dynamic Analysis - Dynamic Analysis is considered testing and evaluating a computer program by executing
it in real time in a controlled test environment. Executing the code allows the analyst to examine any visual and
ephemeral effects caused by code on the test environment. (Rouse)
ThreatAnalyzer - ThreatAnalyzer is a dynamic malware analysis sandbox used to reveal the impact malware
can have on an organization so they can respond quickly. (ThreatAnalyzer)
Malware - Malware is any software that is intended to damage or disable a computer or computer system.
(Christensson)
Equipment Used
Hardware:
Device OS Version Comments
LCDI Workstation Windows 10 Used to host software that was used for
malware analysis
Cisco VoIP Phone N/A Used to aid in data generation for one
piece of malware
Software:
Software Name Version Comments
Amazon AWS Current Used as remote platform for malware
analysis
Process Monitor 3.32 Used as part of our System Internals
Suite of applications to perform dynamic
analysis on malware within our RDP
Threat Analyzer Client
Results
Several pieces and types of malware were recorded, as well as some common scams that are often known to
install malware onto a system. The data from these samples included VirusTotal and ThreatAnalyzer analysis,
as well as physically running them on the Amazon Workspace. Below are some of the examples of the findings
that we came across.
This particular piece of malware was disguised as a flash updater, but immediate red flags arose when we saw
the name of the file, as seen in Figure 1 as a long string of numbers and letters. Also, the company that was the
claimed publisher was not the well-known and trusted Adobe. Rather it was a company called Emurasoft, Inc.
This is where the process became interesting. A file recently named stub.exe had changed its name to
Trojan.exe ironically enough. Highlighted above in figure 3 is its process and the attempt to connect back out to
an external address, this was likely to aid the next part of the malware, the keylogger it dropped.
We derived that the whole purpose of this malware was to send data out of our system and back to the attacker.
Due to the constraints of our AWS environment, the malware was thankfully unable to actually send data out.
We decided to follow the path that was indicated in the command it ran to open the netshell. Within this
directory, we found a text file that had been logging all our activity since installing this flash player update. It
recorded us opening applications, all keystrokes, and even what some of the applications we had opened were
doing on our system. In order to test these actions live, we opened up Notepad and typed something in. Sure
enough, it was logging everything and attempting to send it to the remote system indicated earlier.
Once installed, the software executes several command prompts and begins its work. Due to prior static
analysis, we were able to predict the targets of the system like the firewall and the administrator account. This
allows the user on the other end to execute any commands they want, including network commands as the
network firewall is now disabled and cannot be reactivated.
Shown above in figure 13 is the static analysis of the actual piece of malware. This piece of malware had also
targeted the task manager and disabled it so we attempted to load task manager. We found the sample of
malware had also turned off our ability to access task manager.
Once our support session had been established, our “representative” showed us how much of a stranglehold
these viruses had on our system. Anyone that is slightly versed in the syntax for Windows Command Prompt
would see this glaring issue in their plan to fool us. The commands they entered literally say “virus found
<name of virus>”, with the resulting error message displayed right below it. Our investigator on the phone with
our representative at the time asked about the error message below. The tech support representative said that
was yet another indication of the presence of this malware and quickly changed the subject.
In order to explain the severity of our issue better, the “representative” proceeded to go over, in excruciating
detail, exactly what these viruses were by surfing to their Wikipedia pages. We are still unsure why they spent
In order to act like they were performing a real service for us, the “representative” installed several free
applications that would strengthen our security, including CCleaner, MalwareBytes, and Adblock Plus. At the
end of our work shift, we quickly ended our phone call but did not disconnect our support session in order to see
if they would drop any additional malware onto our system before leaving. Instead, they simply typed in a new
Notepad window asking us to call them back.
Conclusion
Having completed our research, we are now able to answer our research questions as found below:
1. Given a piece of malware, what type of information can be discovered using different forms of malware
analysis?
2. Is Amazon EC2 able to supply a safe environment to analyze malware in?
3. Is ThreatAnalyzer able to successfully analyze all samples of malware?
4. Is the information gathered from ThreatAnalyzer relevant in understanding malware?
A largely varying amount of information can be available from malware samples. Naturally, the type of
Future Work
Using the AWS platform for this type of forensic analysis worked much better than expected. We believe this is
a good tool to use in order to provide safety to the lab’s internal network while providing the functionality of a
normal computer system in which to introduce malware samples. We would like to see this platform used in the
future for this purpose. One addition task would be to configure it to allow multiple people to interact with it at
one time. Having just one user account limited our ability to analyze more than one sample at a time. We would
have liked to analyze more samples than we had the opportunity to do.
6. Rouse, M. (2006, November). What is static analysis (static code analysis)? Retrieved from
http://searchwindevelopment.techtarget.com/definition/static-analysis
7. Rouse, M. (2006, May). What is static analysis (static code analysis)? Retrieved from
http://searchsoftwarequality.techtarget.com/definition/dynamic-analysis