PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

04/23/2019
by   Denis Ugarte, et al.
0

PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents. Similarly to other scripting languages used by malware, PowerShell attacks are challenging to analyze due to the extensive use of multiple obfuscation layers, which make the real malicious code hard to be unveiled. To the best of our knowledge, a comprehensive solution for properly de-obfuscating such attacks is currently missing. In this paper, we present PowerDrive, an open-source, static and dynamic multi-stage de-obfuscator for PowerShell attacks. PowerDrive instruments the PowerShell code to progressively de-obfuscate it by showing the analyst the employed obfuscation steps. We used PowerDrive to successfully analyze thousands of PowerShell attacks extracted from various malware vectors and executables. The attained results show interesting patterns used by attackers to devise their malicious scripts. Moreover, we provide a taxonomy of behavioral models adopted by the analyzed codes and a comprehensive list of the malicious domains contacted during the analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/02/2021

Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation

With the continuous rise of malicious campaigns and the exploitation of ...
research
10/30/2018

SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation

The popularity of the PDF format and the rich JavaScript environment tha...
research
11/02/2018

Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware

Malware still constitutes a major threat in the cybersecurity landscape,...
research
09/20/2021

A proactive malicious software identification approach for digital forensic examiners

Digital investigators often get involved with cases, which seemingly poi...
research
07/29/2023

Vulnerability Detection Approaches on Application Behaviors in Mobile Environment

Several solutions ensuring the dynamic detection of malicious activities...
research
03/30/2021

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

In recent years malware has become increasingly sophisticated and diffic...

Please sign up or login with your details

Forgot password? Click here to reset