Detection and Analysis Cerber Ransomware Based On Network Forensics Behavior
Detection and Analysis Cerber Ransomware Based On Network Forensics Behavior
04) 836
of exploit kit (EK) and a payload Ransomware used by encrypted and placed in the folder % APPDATA%
cyber criminals. or% TEMP% in the user profile.
This paper is structured as follows, in Section 2 we
describe Ransomware, Cerber, and Network Forensics. In Back-up spoliation: shortly after Delivery and execu-
Section 3 we describe Methodology, the hardware, and tion processes, Ransomware will search for a file and
software used to analyze Cerber Ransomware by using folder backup and delete all the files for avoiding the
Network Forensics Behavior Based. In Section 4 which victim that will restore files and folders that have
is the result of an analysis of the findings of this paper. been encrypted. In a Windows system, vssadmin
Section 5 is part of the Conclusion and Future Work. tool delete volume shadow copy of the system, such
as cryptolocker Ransomware and Locky will run the
command to remove all shadow copies of the system.
2 Basic Theory File encryption; once the file, folder and shadow copy
back-up were completely removed, the malware will
2.1 Ransomware perform the secure key exchange with the command
and control (C2) server, build an encryption key that
Ransomware is a type of malware that restricts access to will only be used on the local system. Ransomware
important information an individual or company with a will identify uniquely to each local system to distin-
way to encrypt files and will ask for a ransom payment guish the strong encryption keys among them using
in exchange for the decryption key to restoring encrypted the AES 256 algorithm the encryption process can
files [7, 26]. The embryo of ransomware called PC Cyborg take anywhere from several minutes to hours depend-
started in 1989 by Dr. Joseph Popp [20]. ing on network latency, number and size of docu-
After infection, the PC Cyborg will hide all the file ments and the number of connected devices.
folders and encrypt files on the C: drive. A script mes-
sage asked for a ransom of $ 189 directed to the PC Cy- User notification and clean-up: in this phase extor-
borg Corporation [26]. The first attack Ransomware uses tion requests and payment instructions are presented
public key cryptography to incorporate a combination of to the victim. Instructions extortion requests and
viruses and Trojan horses called cryptovirus and they saved to the hard drive, sometimes the instruction
called ”cryptovirological attacks” [35]. The five phases file in the same folder with the encrypted files as an
of ransomware [26] shown in Figure 1: example of CryptoWall version 3 with the file name
HELP DECRYPT.
# .txt, and # decrypt MY FILES # .vbs) in each folder 3.1 Obtain Information
that has been encrypted.
Two important things that need to be done network foren-
sic Investigator at the beginning of the investigation: to
2.3 Network Forensic obtain information about the incident itself and get infor-
Network Forensics is a branch of Digital Forensics that mation about the environment. Important points to note
use proven scientific techniques to collect, to use, to iden- regarding the incident is a description of what happened,
tify, examine, linking, to analyze, and documenting digital the timestamp (date, time, and method of the invention
evidence from several sources of digital evidence and elec- of the incident), people involved, systems and data in-
tronic evidence [1, 21, 23]. Network Forensic very reliable volved, the manager Incident and processes, legal issues,
to capture the network traffic to and from one or multiple time for investigation/recovery/resolution and Goals.
hosts that can later be revealed channels, methods, and Social and political dynamics could change during the
the spread of malicious code [12, 23]. incident, investigators need to spend some time under-
stand and respond to specific events. The following things
Obstacles often faced by the Network of Forensic inves-
about the environment: Business models, Legal issues,
tigators are gathering evidence and acceptance are often
network topology, network available sources of evidence,
vague, poorly understood, or lack of evidence. When per-
Organizational structure, Incident Response Management
forming network forensics, investigators often work with
Process, Resources available (staff, equipment, funding,
a live system (online) that cannot be taken offline. This
and time).
may include routers, switches, servers and other types of
network devices [30].
Forensic evidence gathering for network similar to the 3.2 Strategies
collection of digital forensic investigation [10] but digital
Network Forensics Investigator must work efficiently [18],
evidence network-based often highly volatile and should
because of network forensics keeps potential sources of
be collected through active ways inherent of evidence
very important evidence, some of which are also very
gathering system [6, 30].
volatile. Strategies points to consider in network forensic
is Understanding the purpose the period of the investiga-
3 Methodology tion, a list of resources (personnel, time, and equipment),
identify possible sources of evidence, to estimate the value
Preparation stage starts with the setup of hardware and and the cost of obtaining the evidence, list prioritizes the
software that will be used in this study. Hardware used acquisition and plans initial acquisition/analysis.
in this study is a Notebook Processor: Intel (R) Core
(TM) i7-6500U CPU @ 2.30GHz, 8GB RAM, 250GB SSD, 3.3 Collect Evidence
Intel 530 Graphics Card. Software used in this study is
Wireshark Version 2.2.5 and dataset from http://www. Three essential components that must be done each time
malware-traffic-analysis.net/. the Network Forensic Investigator to obtain evidence:
In general, there are three methods for detecting mal- Document, Capture and Store/Transport. Make sure the
ware: static feature, host behavior, and network-based document keeps a log of all the systems accessible and
behavior [7, 30, 32]. Detection methods used in the study all actions taken during the collection of evidence, as well
Cerber Ransomware is a network-based behavior. Net- as noting the date, time, sources of, methods of acquisi-
work behavior is to identify traffic patterns that did not tion, and the name of the investigator and the chain of
occur during normal operation of the network by check- custody [23, 30].
ing Packet Inspection: checking header, protocol, viruses,
spam. Signature Detection: It monitors the content of 3.4 Analysis
packets in the network and comparing the pattern of at-
The important elements to consider in the Analyze phase
tacks before configuration [23].
is:
Inside the Network Forensics Investigation research, we
use OSCAR Methodology (Obtain Information, Strate- • Correlation: The advantages of network forensics
gies, Collect Evidence, Analyze and Report) [30]. Illus- involves multiple sources of evidence such as time
tration of the Methodology is shown in Figure 2. stamp and other sources of evidence that can be cor-
related that would become sources of new evidence.
Figure 2: OSCAR methodology • Events of Interest: Certain events will stand out, po-
tentially more relevant than another event. Network
International Journal of Network Security, Vol.20, No.5, PP.836-843, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).04) 839
• Factual.
4 Result
Figure 4: NBNS traffic analysis in wireshark
In our research focus is on the side of the detection and
analyze. Obtain Information from this study suspected
of infection and spread of Ransomware in a corporate en- IP, MAC Address and hostname we already know, the
vironment via a Network. Phase Strategies the company next phase determine malware which infects the host
before infected with malware is to installing packet cap- name of the Stewie PC. After deep analysis of sev-
ture tools to capture every traffic if an illegal act when eral packet shown in Figure 5 traffic to the domain.top,
there is either an attack from the inside or from the out- usually malware author used domain.top in conducting
side that later can become digital evidence to support criminal activities. List Domain [13] which is gener-
the forensic measures if there is a violation of the law. ally used is Domains lclebb6kvohlkcml.onion [.] link
The dataset for research using sample data from http:// lclebb6kvohlkcml.onion [.] nu bmacyzmea723xyaz.onion
malware-traffic-analysis.net/index.html, file for- [.] link bmacyzmea723xyaz.onion [.] nu ne-
mat packet capture (PCAP) with a filename 2017-01-28 jdtkok7oz5kjoc.onion [.] link nejdtkok7oz5kjoc.onion [.]
traffic-analysis.pcap file size 3,173 KB. nu.
4.1 Analysis
Timestamp in the digital forensic very important role be-
cause it contains information related to the show in a con-
dition when or time [1]. Detection and forensic analysis
using Wireshark Network with filter HTTP.request first
thing to do is to determine when the first time the host
computer is infected, show in Figure 3 shows the first time
an infected computer is on time 2017-01-27 22:53:54 UTC
or January 28, 2017 05:53:54 SE Asia Standard Time.
After knowing the date and time of the infection the
next phase is to detect and analyze the IP and the
hostname of the computer has been infected. IP detec- Figure 5: Information gathering
tion, MAC Address Hostname and NetBIOS analysis per-
formed by using filter NBNS. NetBIOS is an application
which allows a computer to communicate with computers From result analyze was we found that the domain
International Journal of Network Security, Vol.20, No.5, PP.836-843, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).04) 840
used by cyber criminals, with the aid the Google search (mail spam) and Exploit Kit. Malicious spam (mail spam)
engine with the keywords p27dokhpz2n7nvgr.1jw2lx.top. is a way of spreading and distribution directly to a ran-
Google.com search results show in Figure 6 describes somware victims to enter the link that has been infected
found malware which infects PCs Stewie is CERBER with malware and takes an active part on the victim to
Ransomware. click a link or attachment files that have been injected
malware. The second method is to use exploits Kit. Ex-
ploits Kit (EK) is designed to work behind the scenes,
which is used by cyber criminals to automate the exploita-
tion of security holes in the victim’s machine when it is
active browsing [34]. EK does not require such active
actions of the victim clicks on a link or attachment.
traffic to the victim server EK. Actors and campaigns two 3) If the exploit is successful, EK sending payload Ran-
different terms, an actor may use one or several campaigns somware and carry out activities to access and en-
to distribute malware. One actor may have used the same cryption of files and folders unnoticed, the victim
campaigns to distribute various types of malware. The completely have been infected by the payload Ran-
next stage was to determine the campaign’s script used somware.
to deliver Cerber is a way to export object in the packet
capture as shown in Figure 11.
PseudoDarkleech is a commonly used campaigns Cer- 5 Conlusion and Future Work
ber author, function to redirect traffic from the victim to
Exploit Kit server with a stealth mode. The pseudoDark- The use of Network Forensic Behavior Based successfully
leech script has the task of injecting web pages and a web detect and analyze Cerber Ransomware as through the re-
server through on the root level. construction Cerber Ransomware chain of events as shown
in Figure 13.
Furthermore, the suggestion to users to stay updated [14] N. Khoa, T. Dat, M. Wanli, S. Dharmendra, “An
browser application and patch vulnerability because the approach to detect network attacks applied for net-
weakest point in the security chain is the human being, work forensics,” in 11th International Conference on
the solution is to strengthen the end point in a human Fuzzy Systems and Knowledge Discovery (FSKD’14),
side to build ”Human Firewall”. pp. 655–660, 2014.
[15] M. Labs, Understanding Ransomware and Strategies
to Defeat it, Technical Report 1, Dec. 2016.
References [16] M. Labs, Mcafee Labs Threats Report, Technical Re-
port 1, Jan. 2017.
[1] K. Ade, R. Imam, and L. Ahmad, “Forensic analy- [17] MalwareBytes, State of Malware Report, Technical
sis and prevent of cross site scripting in single victim Report 1, Jan. 2017.
attack using open web application security project [18] M. H. Mate, S. R. Kapse, “Network forensic tool
(owasp) framework,” Journal of Theoretical and Ap- - concept and architecture,” in Fifth International
plied Information Technology, vol. 95, no. 6, pp. Conference on Communication Systems and Network
1363–1371, 2017. Technologies, Apr. 2015.
[2] A. Alexander and C. Anders, “The state of ran- [19] Z. Mohd, S. Shahrin, A. M. Faizal, S. S. Rahayu, and
somware, trends and mitigation techniques,” in H. C. Yun, “A comparative study on feature selec-
IEEE East-West Design, 2017. tion method for n-gram mobile malware detection,”
[3] A. A. Ali and Z. N. A. Kamarul, “Attack inten- International Journal of Network Security, vol. 19,
tion recognition: A review,” International Journal of pp. 1–7, 2017.
Network Security, vol. 19, no. 2, pp. 244–250, 2017. [20] Monika, Z. Pavol, and L. Dale, “Experimental analy-
[4] L. Andy, C. Armour, and B. pearce. Jack, “Ran- sis of ransomware on windows and android platforms:
somware becomes the most prevalent form of mal- Evolution and characterization,” Procedia Computer
ware and hits an ever-wider range of victims,” Net- Science, vol. 94, pp. 465–472, 2016.
work Security, vol. 2017, no. 2, pp. 1–2, 2017. [21] B. Nadia, K. Mohamed, Z. Khaled, and B. Chafika,
[5] P. Athina and K. Vasilios, “Differential malware “Iwnetfaf: An integrated wireless network forensic
forensics,” Digital Investigation, vol. 10, no. 4, pp. analysis framework,” in Cybersecurity and Cyber-
311–322, 2013. forensics Conference (CCC’16), pp. 35–40, 2016.
[22] P. A. Networks, Exploit Kit Getting in Any Means
[6] M. Baca, J. Cosic, Z. Cosic, “Forensic analysis of
Neccasary, Technical Report 2, June 2017.
social networks (case study),” in Proceedings of 33rd
International Conference on Information Technology [23] E. S. Pilli and R. C. Joshi, Fundamentals of Network
Interfaces, pp. 219–223, 2013. Forensics, Springer, 2016.
[24] R. Pratyush and K. Prabhakar, “Network detection
[7] K. Cabaj and W. Mazurczyk, “Using software-
of ransomware delivered by exploit kit,” ARPN Jour-
defined networking for ransomware mitigation: the
nal of Engineering and Applied Sciences, vol. 12,
case of cryptowall,” IEEE Network, vol. 30, no. 6,
no. 12, pp. 3885–3889, 2017.
pp. 14–20, 2016.
[25] A. Rab, A. Neville, A. Anand, et al., Ransomware
[8] K. Clemens, C. PaoloMilani, and K. C. and, “Effec-
and Businesses 2016, Technical Report 1, July 2016.
tive and efficient malware detection at the end host
[26] B. Ross, “Ransomware attacks: Detection, preven-
clemens,” in Proceedings of the 18th Conference on
tion and cure,” Network Security, vol. 2016, no. 9,
USENIX Security Symposium, pp. 70–82, 2011.
pp. 5–9, 2016.
[9] P. Ebenezer and A. Aderemi, “Efficient feature selec- [27] A. Saeed and S. Paul, “Optimised malware detection
tion technique for network intrusion detection sys- in digital forensics,” International Journal of Net-
tem using discrete differential evolution and deci- work Security, vol. 6, no. 1, pp. 01–15, 2014.
sion tree,” International Journal of Network Secu- [28] G. S. Sanjay and K. Kamalanathan, “Understanding
rity, vol. 19, no. 5, pp. 660–669, 2017. and defending crypto-ransomware,” ARPN Journal
[10] C. Eoghan, Digital Evidence and Computer Crime, of Engineering and Applied Sciences, vol. 12, no. 12,
Elsevier Academic Press, 2011. pp. 3920–3925, 2017.
[11] S. Gordon, “Malvertising hits dating websites,” Net- [29] D. Sanjeev, L. Yang, Z. Wei, and C. Mahintham,
work Security, vol. 2015, no. 9, p. 2, 2015. “Semantics-based online malware detection: To-
[12] R. Imam, E. Jazi, A. Ahmad, and Subanar, “Log wards efficient real-time protection against mal-
analysis techniques using clustering in network foren- ware,” IEEE Transactions on Information Forensics
sics,” International Journal of Computer Science and and Security, vol. 11, no. 2, 2016.
Information Security, vol. 10, 2013. [30] D. Sherri and H. Jonathan, Network Forensics:
[13] S. James, S. Drew, and S. Visiting, Cerber & Tracking Hackers Through Cyberspace, Prentice Hall,
KeRanger: The Latest Examples of Weaponized En- 2012.
cryption, Institute for Critical Infrastructure Tech- [31] E. Tim, “Ransomware: Threat and response,” Net-
nology, 2016. work Security, vol. 2016, no. 10, pp. 17–19, 2016.
International Journal of Network Security, Vol.20, No.5, PP.836-843, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).04) 843