{"id":8645,"date":"2020-06-27T00:20:00","date_gmt":"2020-06-27T00:20:00","guid":{"rendered":"https:\/\/www.freefixer.com\/b\/?p=8645"},"modified":"2020-06-27T16:00:27","modified_gmt":"2020-06-27T16:00:27","slug":"hello-cuckoo-sandbox","status":"publish","type":"post","link":"https:\/\/www.freefixer.com\/b\/hello-cuckoo-sandbox\/","title":{"rendered":"Say Hi To Cuckoo Sandbox!"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"248\" src=\"https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/cuckoo_logo-1024x248.png\" alt=\"\" class=\"wp-image-8650\" srcset=\"https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/cuckoo_logo-1024x248.png 1024w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/cuckoo_logo-300x73.png 300w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/cuckoo_logo-768x186.png 768w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/cuckoo_logo.png 1237w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/cuckoosandbox.org\">Cuckoo<\/a> is an open source <strong>automated malware analysis tool<\/strong>. Cuckoo can execute files and monitor the behaviour. And if you are running <a href=\"https:\/\/www.freefixer.com\">FreeFixer<\/a>, your suspicious files will also be analysed by the sandbox. For free.<\/p>\n\n\n\n<p>I&#8217;ll try to explain what Cuckoo can do more in detail by using examples from the Cuckoo reports on files listed here at freefixer.com:<\/p>\n\n\n\n<p>One of the most useful features is that Cuckoo can <strong>trace API calls<\/strong>. Here&#8217;s an example from <a href=\"https:\/\/www.freefixer.com\/library\/file\/RunBoosterUpdateTask64.exe-297552\/\">RunBoosterUpdateTask64.exe<\/a>, where you can see that it calls <code>CreateServiceW<\/code> to register a driver named <code>WinDivert64.sys<\/code>. This is pretty useful if you are trying to find out what a particular file on your system is doing.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\"call\": {\n  \"category\": \"services\",\n  \"status\": 1,\n  \"stacktrace\": [],\n  \"api\": \"CreateServiceW\",\n  \"return_value\": 4536928,\n  \"arguments\": {\n    \"service_start_name\": \"\",\n    \"start_type\": 2,\n    \"service_handle\": \"0x0000000000453a60\",\n    \"display_name\": \"WinDivert1.2\",\n    \"error_control\": 1,\n    \"service_name\": \"WinDivert1.2\",\n    \"filepath\": \"C:\\\\Windows\\\\System32\\\\drivers\\\\WinDivert64.sys\",\n    \"filepath_r\": \"C:\\\\Windows\\\\system32\\\\drivers\\\\WinDivert64.sys\",\n    \"service_manager_handle\": \"0x0000000000453a00\",\n    \"desired_access\": 983551,\n    \"service_type\": 1,\n    \"password\": \"\"\n  },\n  \"time\": 1576385586.79675,\n  \"tid\": 2436,\n  \"flags\": {}\n}<\/pre>\n\n\n\n<p>Cuckoo also <strong>monitors host resolving<\/strong>. Here&#8217;s another example from the log where <a href=\"https:\/\/www.freefixer.com\/library\/file\/RunBoosterUpdateTask64.exe-297552\/\">RunBoosterUpdateTask64.exe<\/a> tries to get the IP address for <strong>update.updinfo.xyz<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\"resolves_host\": [ \"update.updinfo.xyz\" ]<\/pre>\n\n\n\n<p>And the list goes on. Cuckoo <strong>detects anti-virtualisation tactics<\/strong>. For example, Cuckoo will notice if the file under test checks for existence of VMware\/VirtualBox registry keys or files.<\/p>\n\n\n\n<p>Here&#8217;s an example from <a href=\"https:\/\/www.freefixer.com\/library\/file\/armsvc.exe-300330\/\">armsvc.exe<\/a> where Cuckoo notice that the process is trying to detect if it is running in VMware using an instruction:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">{\n  \"markcount\": 1,\n  \"families\": [],\n  \"description\": \"Detects VMWare through the in instruction feature\",\n  \"severity\": 3,\n...<\/pre>\n\n\n\n<p>Cuckoo will <strong>detect potential compressed or encrypted data<\/strong> in the executable files by measuring the entropy in the file. Cuckoo can also <strong>step through installation wizards<\/strong> and <strong>takes screenshots <\/strong>during the analysis. It will also log UDP and TCP connection.<\/p>\n\n\n\n<p>I&#8217;m impressed by all the features.<\/p>\n\n\n\n<p>So, I&#8217;ve set up a Cuckoo installation that freefixer.com will use to analyse files. The approach is simple. Freefixer.com will upload files to sandbox and after a while the analysis will be displayed on the web site. I&#8217;ve decided to display the Summary, Generic, Dropped, Signatures, Yara, and Network sections from the sandbox report. Here&#8217;s an example report for <a href=\"https:\/\/www.freefixer.com\/library\/file\/armsvc.exe-300330\/\">armsvc.exe<\/a>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report.png\"><img loading=\"lazy\" width=\"633\" height=\"1024\" src=\"https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-633x1024.png\" alt=\"\" class=\"wp-image-8651\" srcset=\"https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-633x1024.png 633w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-186x300.png 186w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-768x1242.png 768w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-950x1536.png 950w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report-1267x2048.png 1267w, https:\/\/www.freefixer.com\/b\/wp-content\/uploads\/2020\/06\/sandbox_report.png 1637w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><\/a><\/figure>\n\n\n\n<p>I&#8217;ve been running Cuckoo for some time now, and it has analysed more that 6000 files. I&#8217;m pretty happy with the result so far. Cuckoo just keeps on running, analysing one file after another.<\/p>\n\n\n\n<p>I&#8217;ve identified a number of issues that needs to be addressed:<\/p>\n\n\n\n<ul><li>Lots of noise! The reports from Cuckoo can be quite verbose and it can be difficult for users to identify the most interesting parts of the log. This is pretty difficult problem that I&#8217;m not sure how to fix. An automated approach is needed to pinpoint the most interesting parts of the log.<\/li><li>Identical screenshots. The sandbox generates screenshots that are almost identical. I&#8217;m currently using ImageMagick to compare images for similarity but it does not work good enough. I think the code needs another round of tuning.<\/li><li>The web site needs to explain what the items in the log means. For example, what does UPD packets sent from the local host to <code>224.0.0.255<\/code> at port <code>5355<\/code> mean? (It&#8217;s a name resolution for hosts on the same local link)<\/li><li>The JSON reports are shown in fixed size text-areas (<code>&lt;pre>&lt;\/pre><\/code>) with vertical and horizontal  scrollbars. Works OK when the amount of JSON data is small. Works terrible when dealing with large amount of data. Please let me know if you have some ideas on how to present the JSON data in smart ways.<\/li><\/ul>\n\n\n\n<p>I&#8217;m hoping, now that you have another tool to analyse files, that this will help you to track down and remove that malware running on your machine.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cuckoo is an open source automated malware analysis tool. Cuckoo can execute files and monitor the behaviour. And if you are running FreeFixer, your suspicious files will also be analysed by the sandbox. For free. I&#8217;ll try to explain what Cuckoo can do more in detail by using examples from the Cuckoo reports on files &hellip; <a href=\"https:\/\/www.freefixer.com\/b\/hello-cuckoo-sandbox\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Say Hi To Cuckoo Sandbox!<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16,19],"tags":[935],"_links":{"self":[{"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/posts\/8645"}],"collection":[{"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/comments?post=8645"}],"version-history":[{"count":11,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/posts\/8645\/revisions"}],"predecessor-version":[{"id":8658,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/posts\/8645\/revisions\/8658"}],"wp:attachment":[{"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/media?parent=8645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/categories?post=8645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.freefixer.com\/b\/wp-json\/wp\/v2\/tags?post=8645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}