VM INTROSPECTION Unearthing and Profi Ling Sophisticated X64 Bit Kernel Mode 16
Total Page:16
File Type:pdf, Size:1020Kb
AN IPOD NANO IN THIS ISSUE’S COMPETITIONWIN! The Quarterly Magazine for Digital Forensics Practitioners ISSUE 16 AUGUST 2013 INSIDE / Using Google Earth / Utilising REP Data / Social Network StegANOGRAPHY / THE History of Malware VM INTROSPECTION Unearthing and profi ling sophisticated x64 bit kernel mode 16 “bootkits” that continue to leverage holes on Windows 7 9 772042 061004 Issue 16 / £14.99 TR Media / REGULARS / INTRODUCING / FROM THE LAB / Book Reviews NEWS, 360, irq, A Fresh Look at Creating New Frontiers CUDA Programming & LEGAL & more… Cryptography For Live Forensics Silence on the Wire DFM16_OFC_Cover - Online.indd 1 22/07/2013 11:42 / FEATURE HISTORY OF MALWARE In the past three decades almost everything has changed in the fi eld of malware and malware analysis. From malware created as a proof of some security concept and malware created for fi nancial gain to malware created to sabotage infrastructure. Nikola Milosevic looks back on the history and evolution of malware and describes the most important malware from the mid ‘80s to today. / INTERMEDIATE alware, short for malicious (or malevolent) software, is In this article we will not describe all kinds of malware software used or created by attackers to disrupt computer (there are just too many), we will, however, look at malware Moperations, gather sensitive information, or gain access that could be considered a game changer, and introduce new to private computer systems. Malware may appear in the form aspects in the world of malware. of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile / Beginnings Of Malware or intrusive software. Malware includes computer viruses, There was malware for other platforms before 1986 but in 1986 ransomware, worms, trojan horses, rootkits, keyloggers, dialers, the fi rst malware for the Personal Computer (PC) appeared. It was spyware, adware, malicious Browser Helper Objects (BHOs) and a virus called Brain.A. Two brothers; Basit and Amjad developed other malicious programs; the majority of active malware threats Brain.A in Pakistan. They wanted to prove that the PC was not are usually worms or trojans rather than viruses [1]. a secure platform, so they created a virus that was capable of The history of malware can be split to fi ve categories that replicating using fl oppy disks. It infected the boot sector of the will also represent a timeframe in which events from that fl oppy drive and the boot sector of every inserted fl oppy disk. category happened. These categories are: Anytime an infected fl oppy was inserted into the PC, it would infect its drive, so the drive would then infect every disk inserted. This • The fi rst category is the early phase of malware development. virus did no harm, and the authors signed the code, with their This is time when the fi rst malware started to appear. phone numbers and address [2]. The intention of early malware • The second category is the early Windows phase. In this writers was to point out problems, rather than do some harm or category we will describe the fi rst Windows malware, along damage. It was later that malware became more destructive. with the fi rst mail worms and macro worms. After Brain.A, other viruses followed. One of the more • The third category is the evolution of network worms. interesting was the Omega virus. It was called Omega because These threats became popular when the Internet became more widespread. Fizzer (2003) was the fi rst malware whose only purpose • The forth category is rootkits and ransomware. These were was to generate revenue and money. It came in an infected the most dangerous evolution of malware before 2010. attachment, and turned the infected machine into a spam • To bring us up to date we look at malware that was made for sender. Before Fuzzer, enthusiasts who would like to prove something or to demonstrate a technique often wrote virtual espionage and sabotage. This malware was created malware. From Fuzzer onwards the main focus for malware by intelligence organisations of some countries. This is the writers was profi t. latest phase of malware evolution that we are now facing. 58 Digital / ForensicS DFM16_58-66_History of Malware.indd 58 22/07/2013 11:35 / FEATURE of the omega sign that it wrote in certain conditions in the and the machine would not be able to boot. The same would console. It was infecting the boot sector, but was not doing happen if the user lost the gamble, the fi le allocation table much damage unless it was Friday 13th. On that day the PC would be deleted from the memory. If the user won the game, would not boot. the virus would copy back the FAT from memory, and the PC The Michelangelo virus would, on Michelangelo’s birthday could be used normally. in 1992, rewrite the fi rst 100 sectors of a hard disk[3]. By doing The next big step in malware evolution was the introduction this, the File Allocation Table (FAT) was destroyed and the PC of Mutation Engine (MtE). A Bulgarian hacker who called could not boot. V-sign is another virus that also infected the himself Dark Avenger created Mutation Engine. It was a tool boot sector and wrote a V sign on the screen every month. that could add mutation functionality to viruses, so they The Walker virus is the next virus that was quite visual and it would be harder to detect by anti-virus software. This was appeared in 1992. It produced an animated walker, walking essentially the fi rst polymorphism module that could take any from one side of the screen to the other. The Ambulance virus virus and make it far more invisible. Until mutation engine, was quite similar to Walker, however, in this case an animated anti-virus software was able to fi nd viruses on PCs using fi le ambulance would drive from one side of screen to the other, signatures and changes in fi le signatures. The introduction of complete with the sound effects of an ambulance. polymorphism made this method ineffective [5]. One of the most interesting viruses to appear at the Virus creation laboratory was the fi rst User Interface (UI) beginning of 1990s was the Casino virus. Casino would copy tool for creating viruses. The user could select the features of the fi le allocation table to memory and then delete the original the virus and create it. This made virus creation easy. It has table. The virus then offered a slot game to user. The user had some disadvantages, but almost anyone using this tool could to get 3 ‘£’ signs if he wanted to use his PC and he had three create a virus [6]. tries. If the user restarted the machine the FAT would be gone, / The First Windows Malware When Windows was released, it was interesting for many / Types of malware users since it provided a powerful user interface. The Malware can be split into the following categories: simplicity of use attracted many users and anything that has many users in the computing world soon becomes interesting • Virus – a self-replicating piece of code that attaches itself to other programs and usually requires human interaction for both attackers and malware creators. to propagate. WinVir was the fi rst Microsoft Windows virus. It was not • Worm – a self-replicating piece of code that spreads via doing much harm and its main feature was that it was self networks and usually doesn’t require human interaction replicating, and that it was the fi rst virus that had the ability to propagate. • Malicious mobile code – a lightweight program that is to infect Windows Portable Executable (PE) fi les. WinVir downloaded from a remote system and executed locally made little changes to infected fi les. When the infected fi le with minimal or no user intervention. was executed, WinVir looked for other PE fi les to infect. • Backdoors – a program that allows attackers to bypass While WinVir was infecting other fi les the original executed normal security controls on a system, gaining access on the attackers own terms. fi le was “rolled back” to its original state; to put it simply, • Trojan horses – a program that appears to have some useful WinVir was deleting itself. or benign purpose, but really masks some hidden malicious Monkey was a virus that infected the Master Boot Record functionality. (MBR) of hard drives and fl oppies. Monkey was moving the • Rootkits – Trojan horse backdoor tools that modify existing operating system software so that an attacker can keep fi rst block of the MBR to the third block and inserting its own access to and hide on a machine. code into the fi rst block. When the infected computer was • Combination malware – Combination of two or more from above. booted, it ran normally, unless it was booted from a fl oppy. In this case, an “Invalid drive specifi cation” message appeared. 59 DFM16_58-66_History of Malware.indd 59 22/07/2013 11:35 / FEATURE One-half or Slovak bomber was interesting and may be some circumstances caused infected fi les to become several considered a quite destructive virus. It infected MBR, EXE and megabytes in size. This was a problem on machines where COM fi les, but did not infect fi les that contained words like SCAN, hard disks were less than 100Mb capacity. The virus had an CLEAN, FINDVIRU, GUARD, NOD, VSAFE, MSAV or CHKDSK in activation routine that displayed a message window on every the fi lename. These fi les were not infected because they might 31st of any month.