DocumentCode :
1597905
Title :
Memory behavior-based automatic malware unpacking in stealth debugging environment
Author :
Kawakoya, Yuhei ; Iwamura, Makoto ; Itoh, Mitsutaka
Author_Institution :
NTT Inf. Sharing & Platform Labs., Musashino, Japan
fYear :
2010
Firstpage :
39
Lastpage :
46
Abstract :
Malware analysts have to first extract hidden original code from a packed executable to analyze malware because most recent malware is obfuscated by a packer in order to disrupt analysis by debuggers and dis-assemblers. There are several studies on automatic extraction of hidden original code, which executes malware in an isolated environment, monitors write memory accesses and instruction fetches at runtime, determines if the code under execution is newly generated, then dumps specific memory areas into a file as candidates for the original code. However, the conventional techniques output many dump files as candidates for the original code when experiments are conducted on malware in the wild. Thus, manual identification of the true original code is needed. In this paper, we present “memory behavior-based unpacking,” an algorithm that automatically identifies the true original code from among many candidates depending on the change in the trend of accessed memory addresses before and after the dumping points. To achieve this algorithm, we have implemented Stealth Debugger, a virtual machine monitor for debugging and monitoring all memory accesses of a process without interruption by any anti-debug functions of the malware. We have evaluated our proposed system by using malware obfuscated by various common packers. The results show that our proposed system successfully finds the original entry points and obtains the original code of the malware.
Keywords :
invasive software; program debugging; software architecture; storage allocation; virtual machines; Stealth Debugger; malware; memory access; memory address; memory behavior based unpacking; original code identification; virtual machine monitor; Debugging; Driver circuits; Kernel; Malware; Monitoring; Virtual machine monitors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
Conference_Location :
Nancy, Lorraine
Print_ISBN :
978-1-4244-9353-1
Type :
conf
DOI :
10.1109/MALWARE.2010.5665794
Filename :
5665794
Link To Document :
بازگشت