Journal of Information Processing
Online ISSN : 1882-6652
ISSN-L : 1882-6652
Stealth Loader: Trace-free Program Loading for Analysis Evasion
Yuhei KawakoyaEitaro ShiojiYuto OtsukiMakoto IwamuraJun Miyoshi
著者情報
ジャーナル フリー

2018 年 26 巻 p. 673-686

詳細
抄録

Understanding how application programming interfaces (APIs) are used in a program plays an important role in malware analysis. This, however, has resulted in an endless battle between malware authors and malware analysts around the development of API [de]obfuscation techniques over the last few decades. Our goal in this paper is to show the limit of existing API de-obfuscation techniques. To do that, we first analyzed existing API [de]obfuscation techniques and clarified that an attack vector commonly exists in these techniques; then, we present Stealth Loader, which is a program loader to bypass all existing API de-obfuscation techniques. The core idea of Stealth Loader is to load a dynamic link library (DLL) and resolve its dependency without leaving any traces on memory to be detected. We demonstrated the effectiveness of Stealth Loader by analyzing a set of Windows executables and malware protected with Stealth Loader using major dynamic and static analysis tools. The results indicate that among other obfuscation tools, only Stealth Loader is able to successfully bypass all analysis tools.

著者関連情報
© 2018 by the Information Processing Society of Japan
前の記事 次の記事
feedback
Top