首页> 外文会议>IEEE Symposium on Computers and Communications >PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection
【24h】

PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection

机译:PSDEM:一种用于恶意PowerShell检测的可行的消除混淆方法

获取原文

摘要

PowerShell is so extremely powerful that we have seen that attackers are increasingly using PowerShell in their attack methods lately. In most cases, PowerShell malware arrives via spam email, using a combination of Microsoft Word documents to infect victims with its deadly payload. Nowadays, the de-obfuscation and analysis of PowerShell are still based on the manual analysis. However, as the number of malicious samples and obfuscation methods growing quickly, it is so slow that can't satisfy the demand. In this paper, we propose a de-obfuscation method of PowerShell called PSDEM which has two layers de-obfuscation to get original PowerShell scripts. One is extracting PowerShell scripts from much obfuscated document code. The other is de-obfuscating scripts including encoding, strings manipulation and code logic obfuscation. Meanwhile, we design an automatic de-obfuscation and analysis tool for malicious PowerShell scripts in Word documents based on PSDEM. We test the performance of the tool from the accuracy of de-obfuscation and the efficiency of time, and evaluation results show that it has a satisfactory performance. PSDEM improves the efficiency and accuracy rate for analyzing malicious PowerShell Scripts in Word documents, as well as provides a path in which further analysis for security experts to get more information about attacks.
机译:PowerShell非常强大,以至于我们发现攻击者最近在其攻击方法中越来越多地使用PowerShell。在大多数情况下,PowerShell恶意软件通过垃圾邮件通过使用Microsoft Word文档的组合来通过其致命负载来感染受害者,从而通过垃圾邮件到达。如今,PowerShell的去混淆和分析仍基于手动分析。但是,随着恶意样本和混淆方法的数量迅速增长,它是如此之慢以至于无法满足需求。在本文中,我们提出了一种称为PSDEM的PowerShell的去混淆方法,该方法具有两层去混淆来获得原始的PowerShell脚本。一种是从大量混淆的文档代码中提取PowerShell脚本。另一个是去混淆脚本,包括编码,字符串处理和代码逻辑混淆。同时,我们针对基于PSDEM的Word文档中的恶意PowerShell脚本设计了一种自动反混淆和分析工具。我们从去混淆的准确性和时间效率方面测试了该工具的性能,评估结果表明该工具具有令人满意的性能。 PSDEM提高了分析Word文档中恶意PowerShell脚本的效率和准确率,并提供了一种途径,供安全专家进行进一步分析以获取有关攻击的更多信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号