The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM

by Ralf Hund Sept. 16, 2017 via www.blackhat.com submitted by belen_caty

The talk presents various aspects of automated dynamic COM malware analysis and shows which approaches are actually practical and which ones are hopeless from the beginning. We show how COM interfaces are already actively used by malware in the wild. Our data retrieved from various sample sharing programs indicates that COM use is widespread and not only limited to sophisticated attacks. It can be used to create arbitrary files, access the registry, control the Windows firewall, tap into audio interfaces and much more. Furthermore, many script engines such as VBScript or JScript use COM underneath. If such samples are analyzed, then this must be dealt with appropriately. Unfortunately, many existing dynamic analysis solutions fail at monitoring COM correctly which makes it easy for malware to evade many common sandboxes.

https://www.blackhat.com/us-16/briefings.html#the-beast-within-evading-dynamic-malware-analysis-u...