New Malware Analysis Method on Digital Forensics
Total Page:16
File Type:pdf, Size:1020Kb
ISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 8(17), DOI: 10.17485/ijst/2015/v8i17/77209, August 2015 ISSN (Online) : 0974-5645 New Malware Analysis Method on Digital Forensics Sunghyuck Hong and Sungjin Lee* Division of Information and Communication, Baekseok University, Korea; [email protected], [email protected] Abstract Recently, Internet usage and development of web technique are getting increased rapidly. The number of Malware occurrence has rapidly increased and new or various types of Malware have been advanced and progressed, so it is time to require analysis for malicious codes in order to defense system. However, current defense mechanisms are always one step behind of Malware attacks and there is not much research on Malware analysis. The behavior of Malware is similar Therefore, we propose to a new approach for Malware analysis method based on registry analysis. to common applications. It is difficult to detect Malware by its behavior. Malware’s registry must be analyzed to detect. Keywords: Digital Forensics, Malware, Network Security, Registry Analysis 1. Introduction cutable code, scripts, active content and other software4. Malware is often disguised as, or embedded in, non- Malware, short for malicious software, is any software used malicious files. As of 2011 the majority of active Malware to disrupt computer operation, gather sensitive informa- threats were worms or Trojans rather than viruses5. In law, tion or gain access to private computer systems. It can Malware is sometimes known as a computer contaminant, appear in the form of executable code, scripts, active con- as in the legal codes of several U.S. states6,7. Spyware or tent and other software. Malware is a general term used to other Malware is sometimes found embedded in programs refer to a variety of forms of hostile or intrusive software. supplied officially by companies, e.g., downloadable from The term bad ware is sometimes used and applied to both websites, that appear useful or attractive, but may have, true (malicious) Malware and unintentionally harm- for example, additional hidden tracking functionality that ful software. Malware means executable code which was gathers marketing statistics. An example of such software, written for malicious purposes. Virus, worm and Trojan which was described as illegitimate, is the Sony rootkit, a horse belonging to it and these are also called malicious Trojan embedded into CDs sold by Sony, which silently codes. The computer malicious codes are evolving fast installed and concealed itself on purchasers’ computers and performing malicious actions using various vulner- with the intention of preventing illicit copying; it also ability over system1. reported on users’ listening habits and unintentionally Malware may be stealthy, intended to steal information created vulnerabilities that were exploited by unrelated or spy on computer users for an extended period with- Malware8Software such as anti-virus, anti-Malware and out their knowledge, as for example Regin or it may be firewalls are used to protect against activity identified as designed to cause harm, often as sabotage (e.g., Stuxnet) malicious and to recover from attacks9. or to extort payment (Crypto Locker). ‘Malware’ is an This research paper is organized as follows. Section 2 umbrella term used to refer to a variety of forms of hostile provides related work. In Section 3, we proposed our new or intrusive software3 including computer viruses, worms, proposal for analysis Malware and Section 4 presents per- Trojan horses, ransomware, spyware, adware, scareware formance evaluation and discussion. Finally, conclusions and other malicious programs. It can take the form of exe- are given in Section 5. *Author for correspondence New Malware Analysis Method on Digital Forensics 2. Related Work Table 1. Types of Malware Recently, network security events are occurred very often. Types Specification They created disasters all around the world such as inter- A computer virus is a Malware program that, net fraud activities and data theft, etc. Malware was the when executed, replicates by inserting copies of itself into other computer programs, data key offender. Therefore, how to detect Malware is a very files or the boot sector of the hard drive; important issue for network security. Malware has the when this replication succeeds, the affected potential to harm the host, which designed to infiltrate or areas are then said to be infected. Viruses damage a computer system without the owner’s informed often perform some type of harmful activity consent (e.g., viruses, backdoors, spyware, Trojans and on infected computers, such as stealing hard disk space or CPU time, accessing private worms)17. There are many security incidents arisen by Virus information, corrupting data, displaying botnet, which has caused series dangers recently. Botnet political or humorous messages on the user’s is not a specific malware. However, a method, that pos- screen, spamming their contacts or logging sibly comprised of thousands or millions hosts controlled their keystrokes. However, not all viruses by hackers. In the past years, botnet-based attacks became carry a destructive payload or attempt to popular and dangerous. In order to facilitate observation hide themselves-the defining characteristic of botnets, many researchers have proposed separate of viruses is that they are self-replicating computer programs which install themselves detection schemes and detection mechanism for moni- without the user’s consent. toring and defending against them. Network worm is usually a standalone prog- Security expert Joe Stewart revealed that in late 2007, ram which runs without any user intervention. the operators of the botnet began to further decentralize It spreads itself to other computers in the their operations, in possible plans to sell portions of the same LAN which has vulnerabilities. While botnet to other operators18. Some reports as of late 2007 the virus is a program or programming indicated the botnet to be in decline, but many security code that can graft its copy onto another program including the operating system. The experts reported that they expect the botnet to remain Worm virus cannot run automatically, it needs to 19 a major security risk online and FBI considers that the be activated by the host program. Both the botnet is a major risk to increase bank fraud, identity theft computer worm and virus can replicate and and other cybercrimes18. As a result, the further research spread themselves, which makes it difficult to on the advanced botnet designed by the attackers becomes distinguish them. Especially, in recent years, important. It is necessary to conduct such research, so as to more and more virus comes to use worms’ technology. Meanwhile, worm adopts the deal with the threat of botnet facing today. Otherwise, our virus technology too. Internet will frequently be attacked by the Nalware in the Trojan horses are computer programs that future. This paper developed a Malware behavioral analy- presented as useful or harmless in order sis tool, Taiwan Malware Analysis Net, which can analysis to induce the user to install and run them, the varietal Malware and output analysis report. The result but also have some hidden malicious goal, scan support anti-virus to detect the known or unknown such as enabling remote access and control malware. There are many types of Malware. Table 1 shows with the aim of gaining full or partial access to the infected system. On the one hand, all types of Malware2-4,12-16. since polymorphism of Trojan horses, it is Trojan Horse hard for the signature-based technology, 3. Virtual Environment for which is the mainly used method in current anti-virus program, detecting them; On the Malware Analysis other hand, Trojan horses have very little immediate impact on the normal operation VMware virtual computing environment was used for of a system and they may go under detected analysis Malware in order to prevent infection on a local for a significant period of time, allowing the PC because the PC has a need to analyze downloaded attacker a large window of opportunity. Malware on virtual computing environments in the same The detection of bots, Malware instances that manner as the end user environment such as a CD-ROM Bot run autonomously on a compromised host, has or a USB device can also be directly connected to analysis. been a challenging problem since the bots, 2 Vol 8 (17) | August 2015 | www.indjst.org Indian Journal of Science and Technology Sunghyuck Hong and Sungjin Lee played a key role in launching all Internet activity on the Internet and transmits that threats such as DDoS, spam, information information in the background to someone extortion, click fraud, etc. Signature-based else. Spyware can also gather information malware detection has been the major defense about e-mail addresses and even passwords against any malware including bots. and credit card numbers. Security threats are coming from various Adware is the common name used to sources, like natural factors or users do not describe software that is given to the user with have authorization to access to the network advertisements embedded in the application. and using the software. These threats Adware is considered a legitimate alternative are result to the lack of authentication, offered to consumers who do not wish to pay authorization and auditing control, cipher for software. There are many ad-supported algorithms weaknesses, weak keys,