- George D. Webster15,
- Bojan Kolosnjaji15,
- Christian von Pentz15,
- Julian Kirsch15,
- Zachary D. Hanif15,
- Apostolis Zarras15 &
- …
- Claudia Eckert15
Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 10327))
Included in the following conference series:
3159Accesses
Abstract
Performing triage of malicious samples is a critical step in security analysis and mitigation development. Unfortunately, the obfuscation and outright removal of information contained in samples makes this a monumentally challenging task. However, the widely used Portable Executable file format (PE32), a data structure used by the Windows OS to handle executable code, contains hidden information that can provide a security analyst with an upper hand. In this paper, we perform the first accurate assessment of the hiddenPE32 field known as the Rich Header and describe how to extract the data that it clandestinely contains. We study 964,816 malware samples and demonstrate how the information contained in the Rich Header can be leveraged to perform rapid triage across millions of samples, including packed and obfuscated binaries. We first show how to quickly identify post-modified and obfuscated binaries through anomalies in the header. Next, we exhibit the Rich Header’s utility in triage by presenting a proof of concept similarity matching algorithm which is solely based on the contents of the Rich Header. With our algorithm we demonstrate how the contents of the Rich Header can be used to identify similar malware, different versions of malware, and when malware has been built under different build environment; revealing potentially distinct actors. Furthermore, we are able to perform these operations in near real-time, less than 6.73 ms on commodity hardware across our studied samples. In conclusion, we establish that this little-studied header in thePE32 format is a valuable asset for security analysts and has a breadth of future potential.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., Wang, L.: On the analysis of the zeus botnet crimeware toolkit. In: Annual International Conference on Privacy Security and Trust (PST) (2010)
RCE Cafe. Microsoft’s Rich Signature (Undocumented) - Comments, February 2008.http://rcecafe.net/?p=27
Chiang, K., Lloyd, L.: A case study of the rustock rootkit and spam bot. In: The First Workshop in Understanding Botnets (2007)
Mandiant Intelligence. APT1: Exposing One of China’s Cyber Espionage Units. 2013.Mandian.com
Jacob, G., Comparetti, P.M., Neugschwandtner, M., Kruegel, C., Vigna, G.: A static, packer-agnostic filter to detect similar malware samples. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 102–122. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37300-8_6
Kendall, K., McMillan, C.: Practical malware analysis. In: Black Hat Conference, USA (2007)
Kolosnjaji, B., Zarras, A., Lengyel, T., Webster, G., Eckert, C.: Adaptive semantics-aware malware classification. In: Caballero, J., Zurutuza, U., Rodríguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 419–439. Springer, Cham (2016). doi:10.1007/978-3-319-40667-1_21
Lifewire. Things They Didn’t Tell You About MS Link and the PE Header (29A) (2004)
Ligh, M., Adair, S., Hartstein, B., Richard, M.: Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. Wiley Publishing, Indianapolis (2010)
Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv.2, 40–45 (2007)
Mandiant. Tracking Malware With Import Hashing, January 2014.https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html
Martignoni, L., Christodorescu, M., Jha, S.: OmniUnpack: fast, generic, and safe unpacking of malware. In: Annual Computer Security Applications Conference (ACSAC) (2007)
Microsoft. Microsoft Portable Executable and Common Object File Format Specification, Rev. 8.3 (2013)
Microsoft. Common Object File Format - KB121460 (2016).https://support.microsoft.com/en-us/kb/121460
Parkour, M., DiMino, A.: Deepend research, May 2015.http://www.deependresearch.org/2012/08/yara-signature-exchange-google-group.htm
Perdisci, R., Lanzi, A., Lee, W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett.29(14), 1941–1946 (2008)
Pietrek, M.: An in-depth look into the win32 portable executable file format. MSDN Mag.17(2), 80–90 (2002)
Pistelli, D.: Microsoft’s Rich Signature (Undocumented) (2012)
Roberts, J.-M.: Virus share, April 2016.https://virusshare.com/
Sarméjeanne, S.: The HTran tool used to hack into french companies, August 2011.https://www.lexsi.com/securityhub/the-htran-tool-used-to-hack-into-french-companies/?lang=en
Sherstobitoff, R.: Inside the world of the citadel trojan. Emergence9 (2012)
Stephen, T.: Rich Header, January 2008.http://trendystephen.blogspot.de/2008/01/rich-header.html
Oreans Technologies. Themida - Advanced Windows Software Protection System, January 2016.http://www.oreans.com/themida.php
Tomonaga, S.: Classifying malware using import API and fuzzy hashing -impfuzzy-, May 2016.http://blog.jpcert.or.jp/2016/05/classifying-mal-a988.html
Webster, G.D., Hanif, Z.D., Ludwig, A.L.P., Lengyel, T.K., Zarras, A., Eckert, C.: SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing. In: Bishop, M., Nascimento, A.C.A. (eds.) ISC 2016. LNCS, vol. 9866, pp. 231–249. Springer, Cham (2016). doi:10.1007/978-3-319-45871-7_15
Wicherski, G.: peHash: a novel approach to fast malware clustering. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2009)
Yan, W., Zhang, Z., Ansari, N.: Revealing packed malware. IEEE Secur. Priv.6(5), 65–69 (2008)
Zakorzhevsky, V.: Mediyes - the dropper with a valid signature, March 2012.https://securelist.com/blog/research/32397/mediyes-the-dropper-with-a-valid-signature-8/
Acknowledgments
We thank our shepherd Pavel Laskov and the reviewers for their valuable feedback. We are thankful to the Technical University of Munich for providing ample infrastructure to support our development efforts. Additionally, we thank the the German Federal Ministry of Education and Research under grant 16KIS0327 (IUNO) and the Bavarian State Ministry of Education, Science and the Arts as part of the FORSEC research association for providing funding for our infrastructure. We would also like to thank the United States Air Force for sponsoring George Webster in his academic pursuit. Lastly, we would like to thank Microsoft Digital Crimes Unit, VirusTotal, and Yara Exchange for their support and valuable discussions.
Author information
Authors and Affiliations
Technical University of Munich, Munich, Germany
George D. Webster, Bojan Kolosnjaji, Christian von Pentz, Julian Kirsch, Zachary D. Hanif, Apostolis Zarras & Claudia Eckert
- George D. Webster
You can also search for this author inPubMed Google Scholar
- Bojan Kolosnjaji
You can also search for this author inPubMed Google Scholar
- Christian von Pentz
You can also search for this author inPubMed Google Scholar
- Julian Kirsch
You can also search for this author inPubMed Google Scholar
- Zachary D. Hanif
You can also search for this author inPubMed Google Scholar
- Apostolis Zarras
You can also search for this author inPubMed Google Scholar
- Claudia Eckert
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toGeorge D. Webster.
Editor information
Editors and Affiliations
Stony Brook University, Stony Brook, New York, USA
Michalis Polychronakis
University of Bonn and Fraunhofer FKIE, Bonn, Germany
Michael Meier
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Webster, G.D.et al. (2017). Finding the Needle: A Study of thePE32 Rich Header and Respective Malware Triage. In: Polychronakis, M., Meier, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2017. Lecture Notes in Computer Science(), vol 10327. Springer, Cham. https://doi.org/10.1007/978-3-319-60876-1_6
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-319-60875-4
Online ISBN:978-3-319-60876-1
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative