Top Banner
CISC 850 : Cyber Analytics Leonardo De La Rosa Institute for Financial Services Analytics University of Delaware Cuckoo Sandbox
7

Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

Jun 11, 2018

Download

Documents

lamdung
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Leonardo De La RosaInstitute for Financial Services Analytics

University of Delaware

Cuckoo Sandbox

Page 2: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Cuckoo Sandbox• Automated malware analysis system.

• Uses virtualization and supports Bare-metal environments.

• Analyzes different malicious files.

• Python based. Easy to customize.

Page 3: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

• Trace API calls.

• Generate Behavioral profile and signatures.

• Dump and analyze Network Traffic.

• Capture file dumps.

• Take screenshots during execution of the analysis.

What Cuckoo can do

Page 4: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Cuckoo’s Architecture

Cuckoo host

Analysis Guests

Bare-metal System

Virtual Environment

Page 5: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Execution Flow

Submit a Task

Launch Virtual

MachineExecute Malware

Log Results

Generate Reports

Page 6: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Drawbacks• Malware checks for virtualization software:

Ø Registry keys.Ø Devices (CD-ROM, HDD).Ø Background processes.Ø IP addresses.

• Evasive techniques:

Ø Time triggers.Ø Extended sleep.Ø User interaction.

Page 7: Cuckoo Sandbox - University of Delawarecavazos/cisc850-spring2017/...CISC 850 : Cyber Analytics Cuckoo Sandbox • Automated malware analysis system. • Uses virtualization and supports

CISC 850 : Cyber Analytics

Demo