Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

anticuckoo fails to... #1

Open
jnferguson opened this issue Jul 12, 2015 · 0 comments
Open

anticuckoo fails to... #1

jnferguson opened this issue Jul 12, 2015 · 0 comments
Assignees

Comments

@jnferguson
Copy link

I'm actually submitting a feature request for your own benefit as i will never get around to doing this myself.

  1. You should look at the processor erratas and similar and look for places where the native processor behaves differently (ive not looked at cuckoo internals, so im not positive how it virtualizes precisely; although system hooks implies a totally different model)
  2. hypercalls
  3. timing issues that are inherent in any sandbox
  4. There was a decent write up about the use of uninitialized memory usage and semi-predictability when surrounded by certain windows API calls; i would imagine that in some cases hooks would tamper with that.

Then!
Screw crashing the sandbox, once its detected, unpack a totally different malware sample; for instance if you have supersecretbadassmalware.exe and it is packed, then have your unpacking code branch on virtualization detection and unpack wellknownmalwaresample.exe. This will cause it to be flagged as benign by the analyst in some instances, and your supersecretbadassmalware.exe to go ignored because the analyst thought they were looking at something totally different.

manual analysis where possible FTW.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants