Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Open Source Sandbox in a corporate infrastructure

Open Source Sandbox in a corporate infrastructure

#Cuckoo #CuckooSandbox #Moloch #ElasticSearch #LokiIOCScanner #ThreatIntelligence #ZeroNights #ZeroNights2017

Avatar for Yury Doroshenko

Yury Doroshenko

November 16, 2017
Tweet

Other Decks in Technology

Transcript

  1. • Chief expert at Sberbank Cyber Security / Redteamer •

    Pentest / Malware Analysis / Memory forensics • Music and cinema lover • I’m into extreme sports #Whoami 2
  2. Social Engineering Mass mail Banker Trojan APT Ransomware #Threats •

    24/7 we are fighting emerging cyberattacks that are targeting • Bank infrastructure • Sensitive data • Client data 3
  3. • Source? • Risk level? • Targeted attack? • Fast

    and efficient analysis? #Who is your enemy 4
  4. #Our Threat Intelligence Platform Data Engine Request For Intelligence Threat

    Hunting Intelligence Driven Response Use Case Management Request For intelligence Infrastructure data Intelligence Analysis Feed Subscribes Reports Incident Management IOC Threat Intelligence proccess Request for intelligence Intelligence analysis Use Case Management Threat Hunting Intelligence Drive Responce 5
  5. #Threat Intelligence product map Vulnerability Management Intel Data Management Request

    For Intelligence Intelligence Analysis Threat Hunting Use Case Management MaxPatrol Bi.Zone FinCERT Kaspersky Group-IB IBM X-Force Cisco ThreatGrid Cisco IntelliShield Cisco Senderbase Microsoft VirusTotal RecordedFuture BrandAnalytics IBM i2 / Watson ThreatQ (on premis) EclecticIQ Anomali BlueLiv LookingGlass ThreatConnect DECOYNET Cynet 360 ERAM Netskope TP RiskIQ StatusToday Variato Recon Verint TP illusive Sqrrl Fussion Behavioral Exabeam Endgame MaxPatrol SOC Prime UCL ThreatModeler SkyBox Cronus Cybot 6
  6. #Personal handy malware analysis lab Cuckoo Sandbox 2.0.4.4 / Cuckoo

    Sandbox 1.3-NG ElasticSearch 5.3.0 Moloch 0.19.2 Volatility 2.6 Loki IOC Scanner 0.24.2 Malheur 0.6.0 Yara 3.6.3 * The lab was deployed and is running smoothly on macOS High Sierra 8
  7. • VM cloacking • Automatic VM generation • Replaces “synthetic”

    VM params with “real” • Antivmdetection 0.1.8 https://github.com/nsmfoo/antivmdetection/ • VMCloak 0.4.4 https://github.com/jbremer/vmcloak/ #Anti Anti-VM and Anti-Sandbox 10
  8. #Out of the box + extra features Dynamic analysis Static

    analysis Process activity analysis Network activity analysis Register analysis Memory-dump post-analysis File activity analysis Network sniffering Post-analysis with LOKI IOC Scanner Custom Yara rules based analysis Behavioral analysis with Malheur Automatic Analysis Tool Moloch + Elasticsearch integration 12
  9. #File formats msi dll bin xls doc exe bin pdf

    ppt zip ps1 html jar js hta ie swf vbs rar cpl apk * Supports automatic format detection 13
  10. • Supporting different built-in modules: • Mitm (Cuckoo Sanbox 2.0.4.4)

    • Snort (Cuckoo Sanbox 2.0.4.4) • Malheur (Cuckoo Sanbox 1.3-NG) • Different signature mechanics • Different analysis approaches • Results complement each other #Using different branches? 22
  11. • Targeted attacks detection • Extendable with modules written in

    python • Now we have a personal powerful malware analysis lab • Just-in-time prevention and remediation steps based on analysis report #Profit? 24
  12. • Hardening Anti Anti-Sandbox & Anti-VM techniques • Integrating it

    in Threat Intelligence Platform • Extending the number of Virtual Machines • Machine learning? #To Do List 25