Buster Sandbox Analyzer

Discussion in 'other anti-malware software' started by Buster_BSA, Nov 29, 2009.

Thread Status:
Not open for further replies.
  1. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
  2. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    Avira's over enthusiastic heuristics(?)

    Hash?
     
  3. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    If anyone is suspicious about the DLL the source code is included in the package, so it can be compiled for peace of mind. :p

    At the moment I will not submit the DLL and request the fix of the false positive because I will modify the DLL so probably it will be detected again.
     
  4. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Buster is building a Malware Analyzer (Volkswagen) for the masses.

    Fahrvergnügen

    Oh my.

    Is this dangerous?
    Can malwares leverage this to circumvent discovery?
     
  5. inka

    inka Registered Member

    Joined:
    Oct 21, 2009
    Posts:
    426
    Is Avira using Ikarus engine? It burps false positives ridiculously often. Try uploading a few of the nirsoft.net freeware utility executables to VirusTotal.com & note that Ikarus and F-protect repeatedly "recognize" the utils as malware. They seem to choke (I personally can't forgive it as "playing it safe") on any packed executable file, as well as on any app that employs AutoIt scripting.

    Buster, I doubt anyone reading this thread actually suspects your dll contains malware, so I hope you aren't taking it personally (the false positive report).
     
  6. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Yes, as consequence of Sandboxie not being able to sandbox certain files, the analysis can not be performed.

    Anyway the % of files that Sandboxie is unable to sandbox is pretty small, therefore in most cases the malware analysis can be done.
     
  7. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    inka: Don´t worry, I don´t take it personally. :)
     
  8. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
  9. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    I have Thought up a slogan:

    If we can't inject, we don't protect!

    Not sure how babelfish will scramble it though, it rhymes in english.
    Assuming you are using translate 2 ways. :D

    Thanks for the link.
     
  10. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Searching: I think it´s possible to circumvent that problem.

    In first place you should sandbox a loader, something like OllyDbg, and then load the problematic file from OllyDbg and let it run from there. I think something like that should work.

    If you find a problematic file you know what to do.
     
  11. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Released Buster Sandbox Analyzer 1.02.

    Change list:

    Added MD5, SHA1 and SHA256 hashing when file to process is specified

    Added custom registry entry checking

    Added a feature to check for updates

    Fixed a few bugs in Buster Sandbox Analyzer

    Fixed a bug in LOG_API library
     
  12. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    I have added a feature that let users to add their own registry entries and a reason of why they were included.

    Like this:

    [Custom_Registry_Entries]
    machine\software\microsoft\Windows\CurrentVersion\policies\system\DisableRegistryTools<->Disable Registry Tools
    user\current\software\Microsoft\Internet Explorer\Main\Start Page<->Change start page

    Does anyone have a list of typical registry modifications performed by malwares? Just like changing start page, disable Windows´firewall, etc.
     
  13. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Last edited: Dec 7, 2009
  14. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    I want a list of typical registry changes done by malwares like change start page, disable firewall, disable Windows update, etc.
     
  15. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Released Buster Sandbox Analyzer 1.04.

    Change list:

    Added support for network shares

    Added a feature to allow wildcards in BSA.DAT

    Added a feature to ignore when sandbox folder is not empty

    Added a feature to check for updates on start

    Updated LOG_API library
     
  16. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    In the PDF, it is explained what they can be used for, sometimes stating malwares like...do this.

    Can't BSA compile it's own DB? User of BSA can choose to share with Buster.

    What is scary:
    http://www.forensicfocus.com/index.php?name=Content&pid=73&page=6
    Go ahead, erase the .sys, .exe, .dll. We be back.
     
  17. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Released Buster Sandbox Analyzer 1.05.

    Change list:

    Added "Assorted suspicious actions"

    Fixed several bugs in Buster Sandbox Analyzer

    Updated LOG_API library
     
  18. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    nice work :thumb:
     
  19. nomarjr3

    nomarjr3 Registered Member

    Joined:
    Jul 31, 2007
    Posts:
    502
    Ditto. (I have Avira as on-demand)

    Something's not right here. This could possibly be an exploit attempt on Sandboxie (but I'll remain subjective on the matter)
     
  20. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Anyone can send the binary to Avira so they can confirm the detection is good or a false positive.
     
  21. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    You can set Internet Explorer to exclude comrpessed files (included in URI's) when you have XP/Vista/Windows Pro (you need Group Policy Editor for that).

    In the Anti Virus forum there is a fun article which Sjoeii posted https://www.wilderssecurity.com/showpost.php?p=1595467&postcount=82

    I guess due to the stronger OS-ses, the attack will focus on social engineering more than theoretical, very hard to program staged entries. Malware has the same issue as flying, although it is safer than driving a car. most people have more fear for flying than driving cars. Social engineering focusses on just that, the user is in the driver seat (allowing access, because they are tricked in to allowing), so these social engineering attacks will occur more than brute, staged exploits. MEan while the media buzz is about airtravel incidents (the staged attacks we do not understand, hence have no grip on, like the aircraft which is flown by the pilot). IMO - I would not worry to much about it.

    Regards Kees
     
  22. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Buster Sandbox Analyzer 1.06 has been released.
     
  23. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Released Buster Sandbox Analyzer version 1.07

    Change list:

    Added detection of new malicious activities
    Updated BSA.DAT
    Updated LOG_API library
     
  24. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Maybe some people didn´t notice that actual version of BSA is able to analyze Sandboxie-aware malwares. That´s an interesting feature added on previous version.
     
  25. Buster_BSA

    Buster_BSA Registered Member

    Joined:
    Nov 29, 2009
    Posts:
    748
    Released Buster Sandbox Analyzer 1.08.

    Change list:

    Added a packet sniffer
    Updated BSA.DAT
    Updated LOG_API library
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.