Skip to content

Silverse/TFG-vbox-cuckoo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

80 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TFG: VirtualBox + Cuckoo hardening against evesive malware

What is this?

This is my Bachelor Degree's Thesis/Project (shortened as TFG in spanish) of the Telecommunication Engineering degree (Major in Telematic) of the University of Zaragoza, Spain.

What are the guide-lines?

A study of the most common techniques used by evasive malware in order to detect if the sample is being analyzed. Then a set of measures will be chosen and implemented as Python scripts (this is the point of the repository). Finally the system will be tested against different tools and real malware with evasive behavior.

What it does for now

Tested on Ubuntu 14.04 LTS host, a Windows XP SP3 guest using VirtualBox 4.3.10 and Cuckoo 1.2.

  • Creates a user in the system for Cuckoo usage.
  • Creates a Vbox VM with proper configuration to avoid detection (new IP, RAM, and so on).
  • Configures a vsftpd server to be used in the VM.
  • Applies registry keys mofications and vbox extra info copying the information of the system that it's been runing on (modifying @nsmfoo's antivmdetection script, commenting the DSDT.bin part because my laptop has too many cores to fit the Vbox maximum)
  • Other in-guest measures like changing the default IP's, disabling windows-firewall, automatic updates...
  • Downloads and installs all the prerequisites of Cuckoo and antivmdetection --> Needs to be fully tested.
  • Modifies cuckoo's configuration files to work with the system.
  • Uses a AutoHotKey script to mimic human behaviour.
  • Creates random files and cache and browsing history of some time before the current date.
  • Allow the VM to have internet connection but firewalling it, limiting the SMTP traffic, and the total number of connections (Trying to avoid being part of spam and DDoS during the analysis)--> Needs to be fully tested.

Everything from an easy menu of 1-5 inputs :D

How to use it?

Clone the repo, and run main.py. The menu and the program are auto-explained... but, first you should select "Install the dependancies and Cuckoo", then "Create a new fixed VM" (you can't if you don't have the dependendancies, so...) and finally "Run Cuckoo and the webserver (localhost:8080)"

Last PaFish's (@a0rtega) analysis output

[pafish] Start

[pafish] Windows version: 5.1 build 2600

[pafish] CPU vendor: GenuineIntel

[pafish] CPU VM traced by checking the difference between CPU timestamp counters (rdtsc)

[pafish] CPU VM traced by checking the difference between CPU timestamp counters (rdtsc) forcing VM exit

[pafish] Sandbox traced using mouse activity

[pafish] Cuckoo hooks information structure traced in the TLS

[pafish] End

About

Bachelor of Engineering Thesis. Virtualbox+cucckoo hardening and setup scripts

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published