PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware

被引:14
|
作者
Ugarte, Denis [1 ]
Maiorca, Davide [1 ]
Cara, Fabrizio [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, Cagliari, Italy
关键词
D O I
10.1007/978-3-030-22038-9_12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents. Similarly to other scripting languages used by malware, PowerShell attacks are challenging to analyze due to the extensive use of multiple obfuscation layers, which make the real malicious code hard to be unveiled. To the best of our knowledge, a comprehensive solution for properly de-obfuscating such attacks is currently missing. In this paper, we present PowerDrive, an open-source, static and dynamic multi-stage de-obfuscator for PowerShell attacks. PowerDrive instruments the PowerShell code to progressively de-obfuscate it by showing the analyst the employed obfuscation steps. We used PowerDrive to successfully analyze thousands of PowerShell attacks extracted from various malware vectors and executables. The attained results show interesting patterns used by attackers to devise their malicious scripts. Moreover, we provide a taxonomy of behavioral models adopted by the analyzed codes and a comprehensive list of the malicious domains contacted during the analysis.
引用
收藏
页码:240 / 259
页数:20
相关论文
共 35 条
  • [1] PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection
    Liu, Chao
    Xia, Bin
    Yu, Min
    Liu, Yunzheng
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 830 - 836
  • [2] DE-OBFUSCATION OF PIAGET
    KINCADE, BL
    [J]. EDUCATION, 1989, 109 (03): : 343 - 345
  • [3] Identifying the Applied Obfuscation Method towards De-obfuscation
    Sagisaka, Hayato
    Tamada, Haruaki
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 873 - 878
  • [4] DRLDO: A Novel DRL based De-obfuscation System for Defence Against Metamorphic Malware
    Sewak, Mohit
    Sahay, Sanjay K.
    Rathore, Hemant
    [J]. DEFENCE SCIENCE JOURNAL, 2021, 71 (01) : 55 - 65
  • [5] Building the De-obfuscation Platform Based on LLVM
    Kim, Jihun
    Ko, Kwangman
    Youn, Jonghee M.
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1269 - 1274
  • [6] De-obfuscation and Detection of Malicious PDF Files with High Accuracy
    Lu, Xun
    Zhuge, Jianwei
    Wang, Ruoyu
    Cao, Yinzhi
    Chen, Yan
    [J]. PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4890 - 4899
  • [7] The De-Obfuscation Method in the Static Detection of Malicious PDF Documents
    Wang, Yuntao
    [J]. Proceedings - 2021 7th Annual International Conference on Network and Information Systems for Computers, ICNISC 2021, 2021, : 44 - 47
  • [8] JS']JSDES - An Automated De-Obfuscation System for Malicious Java']JavaScript
    AbdelKhalek, Moataz
    Shosha, Ahmed
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [9] Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
    Yosuke Isobe
    Haruaki Tamada
    [J]. International Journal of Networked and Distributed Computing, 2018, 6 (4) : 232 - 238
  • [10] Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning
    Chen, Zhiqian
    Kolhe, Gaurav
    Rafatirad, Setareh
    Lu, Chang-Tien
    Manoj, Sai P. D.
    Homayoun, Houman
    Zhao, Liang
    [J]. PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 358 - 363