Living off the Land Binaries with Virtual Machines
As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim devic...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Högskolan i Halmstad
2021
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44842 |
id |
ndltd-UPSALLA1-oai-DiVA.org-hh-44842 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-hh-448422021-06-23T05:24:43ZLiving off the Land Binaries with Virtual MachinesengAtt utnyttja virtuella maskiner för att injicera ransomwareLingaas Türk, JakobHögskolan i Halmstad2021LOLbinLiving off the landvirtual machine escapefileless malwareComputer SciencesDatavetenskap (datalogi)As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures).This thesis attempts to use virtual machines as a living of the land binary. By utilizing the virtualenvironment of Windows iso images within a hypervisor, the attacker can download and execute abinary without being stopped by the bare metal host’s IDS or IPS. As the attacker controls the virtualenvironment, they can disable Windows Defender within the virtual machine and acquire theransomware without the upper layer of IDS or IPS even noticing, meaning they also remain stealthyfor a persistent engagement. The attacker would then proceed to use the share folder functionalityof the hypervisor and target a directory with sensitive files, before executive the binary within thevirtual machine. To the bare metal host, it would look like a hypervisor process is affecting the fileswithin the shared folder, which does not raise any alarms. However, what is actually happening is theransomware of the attacker’s choice has encrypted the files of the target directory (or mounteddrive, depending on method used), and can now continue to the next directory (or drive).The results of this work showed that virtual machines can be used for living off the land binariesattacks by utilizing either the shared folder functionality of a specific hypervisor, or by mounting adrive to a virtual machine. The experiments were proven to work within their own parameters,assuming certain requirements are fulfilled for the attack to be doable. Defenders can tweak IDS andIPS policies to limit or warn when a user access or changes partitions or limiting the accessibility forthe hypervisors native to the machine. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44842application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
LOLbin Living off the land virtual machine escape fileless malware Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
LOLbin Living off the land virtual machine escape fileless malware Computer Sciences Datavetenskap (datalogi) Lingaas Türk, Jakob Living off the Land Binaries with Virtual Machines |
description |
As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures).This thesis attempts to use virtual machines as a living of the land binary. By utilizing the virtualenvironment of Windows iso images within a hypervisor, the attacker can download and execute abinary without being stopped by the bare metal host’s IDS or IPS. As the attacker controls the virtualenvironment, they can disable Windows Defender within the virtual machine and acquire theransomware without the upper layer of IDS or IPS even noticing, meaning they also remain stealthyfor a persistent engagement. The attacker would then proceed to use the share folder functionalityof the hypervisor and target a directory with sensitive files, before executive the binary within thevirtual machine. To the bare metal host, it would look like a hypervisor process is affecting the fileswithin the shared folder, which does not raise any alarms. However, what is actually happening is theransomware of the attacker’s choice has encrypted the files of the target directory (or mounteddrive, depending on method used), and can now continue to the next directory (or drive).The results of this work showed that virtual machines can be used for living off the land binariesattacks by utilizing either the shared folder functionality of a specific hypervisor, or by mounting adrive to a virtual machine. The experiments were proven to work within their own parameters,assuming certain requirements are fulfilled for the attack to be doable. Defenders can tweak IDS andIPS policies to limit or warn when a user access or changes partitions or limiting the accessibility forthe hypervisors native to the machine. |
author |
Lingaas Türk, Jakob |
author_facet |
Lingaas Türk, Jakob |
author_sort |
Lingaas Türk, Jakob |
title |
Living off the Land Binaries with Virtual Machines |
title_short |
Living off the Land Binaries with Virtual Machines |
title_full |
Living off the Land Binaries with Virtual Machines |
title_fullStr |
Living off the Land Binaries with Virtual Machines |
title_full_unstemmed |
Living off the Land Binaries with Virtual Machines |
title_sort |
living off the land binaries with virtual machines |
publisher |
Högskolan i Halmstad |
publishDate |
2021 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44842 |
work_keys_str_mv |
AT lingaasturkjakob livingoffthelandbinarieswithvirtualmachines AT lingaasturkjakob attutnyttjavirtuellamaskinerforattinjiceraransomware |
_version_ |
1719411732379598848 |