CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY - Advances in Digital Forensics XI
Conference Papers Year : 2015

CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY

Abstract

Dynamic link library (DLL) injection is a method of forcing a running process to load a DLL into its address space. Malware authors use DLL injection to hide their code while it executes on a system. Due to the large number and variety of DLLs in modern Windows systems, distinguishing a malicious DLL from a legitimate DLL in an arbitrary process is non-trivial and often requires the use of previously-established indicators of compromise. Additionally, the DLLs loaded in a process naturally fluctuate over time, adding to the difficulty of identifying malicious DLLs. Machine learning has been shown to be a viable approach for classifying malicious software, but it has not as yet been applied to malware in memory images. In order to identify the behavior of malicious DLLs that were injected into processes, 33,160 Windows 7 x86 memory images were generated from a set of malware samples obtained from VirusShare. DLL artifacts were extracted from the memory images and analyzed to identify behavioral patterns of malicious and legitimate DLLs. These patterns highlight features of DLLs that can be applied as heuristics to help identify malicious injected DLLs in Windows 7 memory. They also establish that machine learning is a viable approach for classifying injected DLLs in Windows memory.
Fichier principal
Vignette du fichier
978-3-319-24123-4_9_Chapter.pdf (256.52 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01449075 , version 1 (30-01-2017)

Licence

Identifiers

Cite

Dae Glendowne, Cody Miller, Wesley Mcgrew, David Dampier. CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY. 11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.149-161, ⟨10.1007/978-3-319-24123-4_9⟩. ⟨hal-01449075⟩
97 View
1221 Download

Altmetric

Share

More