Detecting Environment-Sensitive Malware

Authors

Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti

Venue

Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), September 2011

Abstract

The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated code. As malware analysis sandboxes increase in popularity, they are faced with the problem of malicious code detecting the instrumented environment to evade analysis. In the absence of an “undetectable”, fully transparent analysis sandbox, defense against sandbox evasion is mostly reactive: Sandbox developers and operators tweak their systems to thwart individual evasion techniques as they become aware of them, leading to a never-ending arms race. The goal of this work is to automate one step of this fight: Screening malware samples for evasive behavior. Thus, we propose novel techniques for detecting malware samples that exhibit semantically different behavior across different analysis sandboxes. These techniques are compatible with any monitoring technology that can be used for dynamic analysis, and are completely agnostic to the way that malware achieves evasion. We implement the proposed techniques in a tool called Disarm, and demonstrate that it can accurately detect evasive malware, leading to the discovery of previously unknown evasion techniques.

BibTeX

@inproceedings{Lindorfer2011Detecting_Environment-Sensitive,
  title     = {{Detecting Environment-Sensitive Malware}},
  author    = {Lindorfer, Martina and Kolbitsch, Clemens and Milani Comparetti, Paolo},
  booktitle = {Proceedings of the International Symposium on Recent Advances in Intrusion Detection},
  series    = {RAID},
  month     = {September},
  year      = {2011}
}