Memory forensics using virtual machine introspection for Malware analysis

A security sandbox is a technology that is often used to detect advanced malware. However, current sandboxes are highly dependent on VM hypervisor types and versions. Thus, in this paper, we introduce a new sandbox design, using memory forensics techniques, to provide an agentless sandbox solution that is independent of the VM hypervisor. In particular, we leverage the VM introspection method to monitor malware running memory data outside the VM and analyze its system behaviors, such as process, file, registry, and network activities. We evaluate the feasibility of this method using 20 advanced and 8 script-based malware samples. We furthermore demonstrate how to analyze malware behavior from memory and verify the results with three different sandbox types. The results show that we can analyze suspicious malware activities, which is also helpful for cyber security defense.

[1]  Chih-Wei Chen,et al.  Efficient spear-phishing threat detection using hypervisor monitor , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[2]  Ian Welch,et al.  Capture - A behavioral analysis tool for applications and documents , 2007 .