Nytro Posted January 8, 2015 Report Posted January 8, 2015 UNVEILING THE KERNEL:ROOTKIT DISCOVERY USINGSELECTIVE AUTOMATED KERNELMEMORY DIFFERENCINGAhmed Zaki & Benjamin HumphreySophos, UKEmail {ahmed.zaki, benjamin.humphrey}@sophos.comABSTRACTAs an increasing number of automated malware analysis systemsbecome mainstream, the emphasis on the relevance of the dataextracted from the analysis task increases. Conceptually,automated malware analysis systems provide information abouta sample and also identify modifi cations to a computer systeminduced by the sample. Traditionally, the focus of such analysissystems has primarily been on monitoring process, disk andnetwork-level behaviour with varying levels of granularity.While providing a varied set of information, these systems offerlimited ability to identify and classify rootkits. The very natureof rootkits makes them hard to classify (and in some cases evendetect) using these scanning techniques. Kernel memorymodifi cations can indicate that samples are trying to concealinformation or hijack execution paths, thus exhibiting maliciousbehaviour. In an environment with a large throughput of analysisjobs, the need arises for an effi cient and accurate way to identifysuch complex threats that could otherwise be misclassifi ed orpass unnoticed. We present a system for identifying rootkitsamples that is based on automated analysis. In this system werecognize the performance and memory constraints of a highthroughputenvironment; instead of monitoring modifi cations tothe whole memory, we capture changes to data structures andmemory regions that, on a Microsoft Windows operating system,are known to have been targeted by rootkits in the past. Weexplain the reasons behind the design decisions and how theyhave refl ected on identifying different classes of rootkits. In ourresearch, we also explore the effectiveness of using this model asa standalone component to identify malicious behaviour. In orderto do this, we run a large set of known clean versus maliciousfi les to identify traits that could be indicative of maliciousactivity.Download: https://www.virusbtn.com/pdf/conference/vb2014/VB2014-ZakiHumphrey.pdf 1 Quote