found that a lot of these samples share their evasive
code that we retrieved in public code repositories.
Finally, we implemented a countermeasure that
seems to be able to thwart evasive malware by instru-
menting the Windows API. In the end, 14 out of the
18 malware tested showed a different behavior with
and without the countermeasure enabled. The highest
overhead measured is on Al-Khaser with an addition
of 14.62% to the execution time.
The code for Nuky’s evasion part and the Yara rule
is available on request.
REFERENCES
Afianian, A., Niksefat, S., Sadeghiyan, B., and Baptiste,
D. (2020). Malware dynamic analysis evasion tech-
niques: A survey. CSUR Computing Surveys - ACM,
52(6).
Blackthorne, J., Bulazel, A., Fasano, A., Biernat, P., and
Yener, B. (2016). Avleak: Fingerprinting antivirus
emulators through black-box testing. In WOOT Work-
shop on Offensive Technologies, number 10, pages
91––105, Austin, TX, USA. USENIX Association.
Bulazel, A. and Yener, B. (2017). A survey on auto-
mated dynamic malware analysis evasion and counter-
evasion: Pc, mobile, and web. In ROOTS Reversing
and Offensive-Oriented Trends Symposium, number 1,
pages 1–21, Vienna, Austria. ACM.
Chen, P., Huygens, C., Desmet, L., and Joosen, W. (2016).
Advanced or not? A comparative study of the use of
anti-debugging and anti-vm techniques in generic and
targeted malware. In IFIP SEC International Infor-
mation Security and Privacy Conference, number 31,
pages 323–336, Ghent, Belgium. Springer.
Chen, X., Andersen, J., Mao, Z. M., Bailey, M., and
Nazario, J. (2008). Towards an understanding of anti-
virtualization and anti-debugging behavior in modern
malware. In DSN Dependable Systems and Networks,
number 38, pages 177–186, Anchorage, Alaska, USA.
IEEE Computer Society.
Dinaburg, A., Royal, P., Sharif, M. I., and Lee, W. (2008).
Ether: malware analysis via hardware virtualization
extensions. In CCS Conference on Computer and
Communications Security, number 15, pages 51–62,
Alexandria, Virginia, USA. ACM.
Garfinkel, T., Adams, K., Warfield, A., and Franklin, J.
(2007). Compatibility is not transparency: VMM
detection myths and realities. In HotOS Hot Topics
in Operating Systems, number 11, pages 30–36, San
Diego, California, USA. USENIX Association.
Kirat, D. and Vigna, G. (2015). Malgene: Automatic extrac-
tion of malware analysis evasion signature. In SIGSAC
Conference on Computer and Communications Secu-
rity, number 22, pages 769–780, Denver, Colorado,
USA. ACM.
Kirat, D., Vigna, G., and Kruegel, C. (2014). Barecloud:
Bare-metal analysis-based evasive malware detection.
In USENIX Security Symposium, number 23, pages
287–301, San Diego, California, USA. USENIX As-
sociation.
Koret, J. and Bachaalany, E. (2015). The Antivirus Hacker’s
Handbook. Number 1. Wiley Publishing.
Lindorfer, M., Kolbitsch, C., and Comparetti, P. M.
(2011). Detecting environment-sensitive malware. In
RAID Recent Advances in Intrusion Detection, num-
ber 14, pages 338–257, Menlo Park, California, USA.
Springer.
Lita, C., Cosovan, D., and Gavrilut, D. (2018). Anti-
emulation trends in modern packers: a survey on the
evolution of anti-emulation techniques in UPA pack-
ers. Computer Virology and Hacking Techniques,
12(2).
Lyda, R. and Hamrock, J. (2007). Using entropy analysis
to find encrypted and packed malware. SP Security &
Privacy - IEEE, 5(2).
Miramirkhani, N., Appini, M. P., Nikiforakis, N., and Poly-
chronakis, M. (2017). Spotless sandboxes: Evading
malware analysis systems using wear-and-tear arti-
facts. In SP Symposium on Security and Privacy, num-
ber 38, pages 1009–1024, San Jose, California, USA.
IEEE Computer Society.
Naval, S., Laxmi, V., Gaur, M. S., Raja, S., Rajarajan,
M., and Conti, M. (2015). Environment–reactive
malware behavior: Detection and categorization. In
DPM/QASA/SETOP Data Privacy Management, Au-
tonomous Spontaneous Security, and Security Assur-
ance, number 3, pages 167–182, Wroclaw, Poland.
Springer.
Tan, J. W. J. and Yap, R. H. C. (2016). Detecting malware
through anti-analysis signals - A preliminary study. In
CANS Cryptology and Network Security, number 15,
pages 542–551, Milan, Italy. Springer.
Tanabe, R., Ueno, W., Ishii, K., Yoshioka, K., Matsumoto,
T., Kasama, T., Inoue, D., and Rossow, C. (2018).
Evasive malware via identifier implanting. In DIMVA
Detection of Intrusions and Malware, and Vulnerabil-
ity Assessment, number 15, pages 162–184, Saclay,
France. Springer.
Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K.,
Matsumoto, T., Kasama, T., Inoue, D., Brengel, M.,
Backes, M., and Rossow, C. (2016). Sandprint: Fin-
gerprinting malware sandboxes to provide intelligence
for sandbox evasion. In RAID Research in Attacks,
Intrusions, and Defenses, number 19, pages 165–187,
Evry, France. Springer.
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
309