Page 206 - Cyber Defense eMagazine August 2024
P. 206

●  Packet  Capture  and Inspection:  Logging  network  traffic  and allowing  the user  to view its
                       contents offers an in-depth view of the interactions between the malware and other systems.
                       This includes information  such as the source and destination  IP addresses,  the ports used,
                       the  protocols  involved,  and  the  timestamps  of  the  communications.  This  can  reveal  if  the
                       malware  is attempting  to communicate  with a command  and control (C&C) server, scan for
                       vulnerable systems, or perform other malicious activities.
                   ●  Encrypted Traffic Analysis: As more and more network traffic becomes encrypted, the ability
                       to analyze  it has  become  increasingly  important.  Sandboxes  using  built-in  tools  like  MITM
                       proxy make it possible to decrypt HTTPS traffic and thus identify malicious activity.

































            Suricata detection of AgentTesla’s exfiltration activity in ANY.RUN


                   ●  Network Threat Detection: For sandboxes, it is also important to not only give access to the
                       network traffic, but also automatically detect potential threats based on predefined signatures
                       or  anomalies.  Solutions  like  Suricata  IDS  can  be  used  to  enhance  the  network  analysis
                       capabilities of a malware sandbox and flag suspicious network activities.


            3. Static Analysis

            Although sandboxes are usually used for dynamic analysis, they can be equally helpful in static analysis:

                   ●  Analyzing Files: Sandboxes can offer a static overview of various file types, such as PDFs,
                       LNK files, and Microsoft Office documents. For instance, malicious PDFs can be analyzed to
                       detect  suspicious  URLs,  while  LNK  files  can  be  inspected  for  embedded  commands  and
                       scripts.  Microsoft  Office  documents  can  be  examined  for  malicious  macros,  images,  QR
                       codes, etc.





            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          206
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   201   202   203   204   205   206   207   208   209   210   211