2013-08-20 04:11 PM
Hi all,
I am putting together some procedures for detecting a malicious PDF using Netwitness.
So far I have gathered that it is fairly easy to search sessions for common indicators such as embedded JavaScript, Flash and actions such as OpenAction or /URI.
I am aware however that the PDF standard makes it very easy to obfuscate malicious content embedded in PDFs, particularly via the following methods:
I am finding it difficult to work out a way (Other then manual investigation) that NW can be used to automate the process of detected malicious PDFs using drills and searches and I was just wondering if anyone had any experience using Netwitness to detect malicious PDFs or any ideas how to overcome common obfuscation attempts?
Thanks in advance!
2013-08-22 05:02 PM
Kit - I think this is best achieved by using the malware analysis module in the product. Here is a response from one of the engineers:
This is really the intended purpose of the RSA Malware Analysis module. It will perform a much deeper inspection of the PDF file contents than what can be achieved natively in core product.
The RSA Malware Analysis module will fully decode PDFs and assess the likelihood that the sample is malcious using the following four scoring methodologies:
1. Static Analysis
PDFs are fully decoded and inspected to statically analyze the sample for malice. This inspection includes, but is not limited to the following:
2. Dynamic Analysis
Running the samples in a sandbox environment and scoring their behavior.
3. Community Awareness
Reviewing existing knowledge of the sample from A/V providors, etc.
4. Session Analysis
Reviewing the Network session to identify known blacklisted sites, threat feeds, etc
2013-08-22 05:02 PM
Kit - I think this is best achieved by using the malware analysis module in the product. Here is a response from one of the engineers:
This is really the intended purpose of the RSA Malware Analysis module. It will perform a much deeper inspection of the PDF file contents than what can be achieved natively in core product.
The RSA Malware Analysis module will fully decode PDFs and assess the likelihood that the sample is malcious using the following four scoring methodologies:
1. Static Analysis
PDFs are fully decoded and inspected to statically analyze the sample for malice. This inspection includes, but is not limited to the following:
2. Dynamic Analysis
Running the samples in a sandbox environment and scoring their behavior.
3. Community Awareness
Reviewing existing knowledge of the sample from A/V providors, etc.
4. Session Analysis
Reviewing the Network session to identify known blacklisted sites, threat feeds, etc