Jump to content
Nytro

Sandbox Overloading with GetSystemTimeAdjustment

Recommended Posts

[h=3]Sandbox Overloading with GetSystemTimeAdjustment[/h]

Lately we came across an interesting sample (MD5: b4f310f5cc7b9cd68d919d50a8415974) we would like to share with you. An initial analysis spotted:

1.png

2.png

To summarize the sample seems to be not showing any interesting behavior at all. However a closer look revealed:

3.png

The process calls GetSystemTimeAdjustment for more than 1.8M times. Since Joe Sandbox captures this API which introduces some additional computation time the overall sample execution slows down dramatically and due to the limited execution time the payload is never reached. We already outlined this technique named "Sandbox overloading" in a previous blog post. Function 4011B4 outlines that GetSystemTimeAdjustment is called for 7.8M times:

4.png

After the loop some anti-emulation routines follow and finally the payload is executed. Since overloading techniques are generic they effect a wide range of dynamic malware analysis system and thus are very powerful. Therefore it is important to have technologies to quickly detect and prevent such prevention techniques.

Full analysis available:

- Joe Sandbox 8.0.0 Analysis b4f310f5cc7b9cd68d919d50a8415974

Posted by Joe Monday, November 4, 2013 2:45 PM

Sursa: Automated Malware Analysis Blog: Sandbox Overloading with GetSystemTimeAdjustment

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...