CN109684827A - Sandbox reports filter method and device - Google Patents

Sandbox reports filter method and device Download PDF

Info

Publication number
CN109684827A
CN109684827A CN201810209007.2A CN201810209007A CN109684827A CN 109684827 A CN109684827 A CN 109684827A CN 201810209007 A CN201810209007 A CN 201810209007A CN 109684827 A CN109684827 A CN 109684827A
Authority
CN
China
Prior art keywords
information
sample file
analysis report
file
running
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810209007.2A
Other languages
Chinese (zh)
Inventor
杨晋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ThreatBook Technology Co Ltd
Original Assignee
Beijing ThreatBook Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ThreatBook Technology Co Ltd filed Critical Beijing ThreatBook Technology Co Ltd
Priority to CN201810209007.2A priority Critical patent/CN109684827A/en
Publication of CN109684827A publication Critical patent/CN109684827A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Abstract

The present invention provides a kind of sandbox report filter method and devices, the described method comprises the following steps: running sample file under predetermined registration operation environment;Obtain the first information generated when running the sample file;Processing is filtered to the first information based on pre-set criteria, forms the second information;Analysis report is formed based on second information.The problem of present invention, which can solve the prior art, can miss the network information of some operating systems itself, also can accidentally intercept the network information of some samples itself.

Description

Sandbox reports filter method and device
Technical field
The present invention relates to malware analysis field, in particular to a kind of sandbox report filter method and device.
Background technique
Sandbox system automates malware analysis system, the malice being currently used primarily under analysis windows platform Software, but its frame supports Linux and Mac OS simultaneously.It can track all processes of malicious software process and its generation Win32API calls record;Detect document creation, deletion and the downloading of Malware;The memory of malicious software process can be obtained Mirror image;System full memory mirror image can be obtained, other tools is facilitated to be further analyzed;Net can be grabbed with pacp format Network data;Screenshot when Malware operation can be grabbed.
Sandbox System Working Principle is as follows: when a sample file is submitted to sandbox system, sandbox system first can Start a true Windows system environments set in advance using software virtual machine, then sample file is put into wherein And it is allowed to run.In sample file operational process, sandbox system can be obtained using the various system probes arranged in advance The various operation informations of sample file.Sandbox system can recycle these information when analyzing terminates and arrangement can as one The analysis report of reading.This part of analysis report can finally be stored.
The network information that sandbox system generates during analyzing sample file is used comprising sandbox system among these The operating system itself network information and the network information that generates at runtime of sample file that generate.This two parts network information It is usually to mix together, and can be stored among original analysis report.Operation used in sandbox system among these The network information that system generates, it can interfere with subsequent analysis work.The prior art usually uses some technological means and exists The behavioural information for intercepting operating system itself in sample file implementation procedure as far as possible, does not allow the row of this part operation system itself It is written among analysis report for information.The realization difficulty that the prior art can therefrom be given is big, and effect is bad, it will usually The network information of some operating systems itself is missed, the network information of some samples itself also can be accidentally intercepted.
Summary of the invention
In view of above-mentioned technical problem, the present invention provides a kind of sandbox report filter method and devices, including following step It is rapid:
A kind of sandbox report filter method comprising:
Sample file is run under predetermined registration operation environment;
Obtain the first information generated when running the sample file;
Processing is filtered to the first information based on pre-set criteria, forms the second information;
Analysis report is formed based on second information.
In a preferred embodiment, under predetermined registration operation environment before operation sample file further include:
Obtain sample file.
In a preferred embodiment, obtaining the first information generated when running the sample file includes following at least one:
It obtains and generates API Calls record when running the sample file, screenshot takes off record and network data recording;
The deletion record of file, newly-built record and Download History when detection runs the sample file;
Obtain the memory mirror of sample file;
System full memory mirror image when obtaining operation sample file.
In a preferred embodiment, processing is filtered to the first information based on pre-set criteria, forms the second information Include:
Obtain the behavioural information in the sample file operational process;
Filter the network behavior information in the behavioural information due to operating system itself;
The network behavior information generated due to sample file based on reservation forms the second information.
In a preferred embodiment, the method also includes:
When meeting preset condition, the analysis report is stored.
In a preferred embodiment, when meeting preset condition, storing the analysis report includes:
Judge whether the capacity of the analysis report is less than preset threshold;
If so, then storing the analysis report.
In a preferred embodiment, it when the capacity of the analysis report is greater than preset threshold, then deletes therein useless Data are stored again.
The embodiment of the invention also provides a kind of sandboxs to report filter device comprising:
Processor is configured to run sample file under predetermined registration operation environment, and obtains production when running the sample file The raw first information;And processing is filtered to the first information based on pre-set criteria, the second information is formed, and be based on institute It states the second information and forms analysis report.
In a preferred embodiment, the processor is further configured to run sample file under predetermined registration operation environment, And obtain the first information generated when running the sample file;And place is filtered to the first information based on pre-set criteria Reason forms the second information, and forms analysis report based on second information.
In a preferred embodiment, the processor is further configured to obtain first generated when running the sample file Information includes following at least one:
It obtains and generates API Calls record when running the sample file, screenshot takes off record and network data recording;
The deletion record of file, newly-built record and Download History when detection runs the sample file;
Obtain the memory mirror of sample file;
System full memory mirror image when obtaining operation sample file.
Using the embodiment of the present invention, analysis sample can be removed in the virtual machine Windows operating system that sandbox system starts When file, the behavior of these operating systems itself is filtered out, to be directed to sandbox system virtual machine when analyzing sample file The garbage that Windows operating system generates is deleted, and can miss some operating systems itself to solve the prior art The network information, the problem of also accidentally intercepting the network information of some samples itself.
Detailed description of the invention
Fig. 1 is the principle flow chart of the sandbox report filter method in the embodiment of the present invention;
Fig. 2 is the principle assumption diagram of the sandbox report filter device in the embodiment of the present invention.
Specific embodiment
In the following, specific embodiments of the present invention are described in detail in conjunction with attached drawing, but not as the limitation of the invention.
It should be understood that various modifications can be made to disclosed embodiments.Therefore, description above should not regard To limit, and only as the example of embodiment.Those skilled in the art will expect within the scope and spirit of this Other modifications.
The attached drawing being included in the description and forms part of the description shows embodiment of the disclosure, and with it is upper What face provided is used to explain the disclosure together to substantially description and the detailed description given below to embodiment of the disclosure Principle.
It is of the invention by the description of the preferred form with reference to the accompanying drawings to the embodiment for being given as non-limiting example These and other characteristic will become apparent.
Although being also understood that invention has been described referring to some specific examples, those skilled in the art Member realizes many other equivalents of the invention in which can determine, they have feature as claimed in claim and therefore all In the protection scope defined by whereby.
When read in conjunction with the accompanying drawings, in view of following detailed description, above and other aspect, the feature and advantage of the disclosure will become It is more readily apparent.
The specific embodiment of the disclosure is described hereinafter with reference to attached drawing;It will be appreciated, however, that the disclosed embodiments are only Various ways implementation can be used in the example of the disclosure.Known and/or duplicate function and structure and be not described in detail to avoid Unnecessary or extra details makes the disclosure smudgy.Therefore, specific structural and functionality disclosed herein is thin Section is not intended to restrictions, but as just the basis of claim and representative basis be used to instructing those skilled in the art with Substantially any appropriate detailed construction diversely uses the disclosure.
This specification can be used phrase " in one embodiment ", " in another embodiment ", " in another embodiment In " or " in other embodiments ", it can be referred to one or more of the identical or different embodiment according to the disclosure.
In the following, the embodiment of the present invention is described in detail in conjunction with attached drawing, the embodiment of the invention provides a kind of sandboxs to report Filtering method.Wherein, sandbox system can generate the network information during analyzing sample file, among these include sandbox system institute The network information that the network information and sample file that the operating system itself used generates generate at runtime.This two parts network Information is usually to mix together.It can be rejected inside the network behavior information being collected into through the embodiment of the present invention Fall the network behavior information of unwanted operating system, only retains network behavior information caused by sample file, thus can Guarantee the validity of analysis report, while deleting hash therein.
The principle flow chart for reporting filter method for the sandbox in the embodiment of the present invention as shown in Figure 1, wherein may include:
Sample file is run under predetermined registration operation environment;
Obtain the first information generated when running the sample file;
Processing is filtered to the first information based on pre-set criteria, forms the second information;
Analysis report is formed based on second information.
In the embodiment of the present invention, sample file can be arbitrary program file, such as test program, or other programs File etc. tests the available analysis report for this document by sandbox.Specifically, sandbox is after obtaining sample file, Corresponding the sample file can be run under predetermined registration operation environment.For example, the predetermined registration operation environment in the embodiment of the present invention can Think windows operating environment, or may be android environment, Linux and Mac OS environment etc., herein not as this The limitation of inventive embodiments can be any operating environment.In addition, before running sample file under predetermined registration operation environment also It may include: acquisition sample file.The mode for wherein obtaining sample file may include obtaining the sample text from other equipment Part wherein may include the mark of file type in the sample file, can determine what sample file was adapted to based on the mark Operating environment selects corresponding operating environment then to run the sample file.
In addition, when running the sample file, the network information, i.e., first caused by available operation sample file Information, the process may include obtaining generation API Calls record, screenshot when running the sample file to take off record and network number According to record;The deletion record of file, newly-built record and Download History when detection runs the sample file;Obtain sample file Memory mirror;And at least one of system full memory mirror image when obtaining operation sample file.
After obtaining the first information, the embodiment of the present invention can be filtered processing to the first information, and reservation is therein to be had With information, i.e. network data caused by sample file.Specifically, the embodiment of the present invention can be based on pre-set criteria to described the One information is filtered processing, the second information is formed, wherein may include:
Obtain the behavioural information in the sample file operational process;
Filter the network behavior information in the behavioural information due to operating system itself;
The network behavior information generated due to sample file based on reservation forms the second information.
It among these include sandbox system institute since sandbox system can generate the network information during analyzing sample file The network information that the network information and sample file that the operating system itself used generates generate at runtime.This two parts network Information is usually to mix together.It can be rejected inside the network behavior information being collected into through the embodiment of the present invention Fall the network behavior information of unwanted operating system, only retains network behavior information caused by sample file, Lai Shengcheng the Two information.Then analysis report can be generated based on the second information, after forming analysis report, the embodiment of the present invention can also be right The analysis report is stored.Such as it can be when meeting preset condition, the analysis report be stored, wherein may include:
Judge whether the capacity of the analysis report is less than preset threshold;
If so, then storing the analysis report.
It, can be to the analysis report for being lower than preset threshold in order to guarantee the utilization rate of memory space in the embodiment of the present invention It is stored, for example, the preset threshold can be the numerical value in the range of 40-100MB.
In addition, then deleting hash therein when the capacity of the analysis report is greater than preset threshold and being deposited again Storage.Or stored after compression processing being carried out to analysis report, it thereby may be ensured that the validity of storage.
For example, the format of a complete " original analysis report " is as follows:
Basic information
Signatures information
Target information
Virustotal information
Network information (present invention mainly handles this partial information)
Behavior information
Metadata information
Strings information
When sandbox dynamic analysis system is using virtual machine analysis executable file, virtual machine Windows operating system can be produced The network access information of raw some operating systems itself.The network information that this operating system itself generates can also be stored in original Among beginning analysis report, it can be referred to as " background clutter " of operating system.When next processing original analysis is reported It waits, this part " background clutter " will be deleted, the relevant information of retention analysis sample.In this way, the later period is using sample text When the analysis report of part, without considering that oneself body of operating system operates, it is only necessary to be analyzed i.e. for the data in report It can.
Above-mentioned configuration based on the embodiment of the present invention can be gone in the virtual machine Windows operating system that sandbox system starts When analyzing sample file, the behavior of these operating systems itself is filtered out, thus for sandbox system when analyzing sample file The garbage that virtual machine Windows operating system generates is deleted, and can miss some operating systems to solve the prior art The network information of itself, the problem of also accidentally intercepting the network information of some samples itself.
In addition, as shown in Fig. 2, report the principle assumption diagram of filter device for one of embodiment of the present invention sandbox, In may include: processor 1 and memory 2.
Wherein, processor 1 is configurable to run sample file under predetermined registration operation environment, and obtains and run sample text The first information generated when part;And processing is filtered to the first information based on pre-set criteria, the second information is formed, and Analysis report is formed based on second information.
In the embodiment of the present invention, sample file can be arbitrary program file, such as test program, or other programs File etc. tests the available analysis report for this document by sandbox.Specifically, sandbox is after obtaining sample file, Processor 1 corresponding can run the sample file under predetermined registration operation environment.For example, the predetermined registration operation in the embodiment of the present invention Environment can be windows operating environment, or may be android environment, Linux and Mac OS environment etc., herein not As the limitation of the embodiment of the present invention, any operating environment can be.In addition, running sample file under predetermined registration operation environment It before can also include: acquisition sample file.Wherein obtaining the mode of sample file may include obtaining from other equipment Sample file wherein may include the mark of file type in the sample file, can determine sample file institute based on the mark The operating environment of adaptation selects corresponding operating environment then to run the sample file.
In addition, when running the sample file, the letter of network caused by the available operation sample file of processor 1 Breath, the i.e. first information, the process may include obtaining generation API Calls record, screenshot when running the sample file to take off record And network data recording;The deletion record of file, newly-built record and Download History when detection runs the sample file;It obtains The memory mirror of sample file;And at least one of system full memory mirror image when obtaining operation sample file.
After obtaining the first information, the processor 1 in the embodiment of the present invention can be filtered processing to the first information, protect Stay useful information therein, i.e. network data caused by sample file.Specifically, processor of the embodiment of the present invention 1 can be with base Processing is filtered to the first information in pre-set criteria, the second information is formed, wherein may include:
Obtain the behavioural information in the sample file operational process;
Filter the network behavior information in the behavioural information due to operating system itself;
The network behavior information generated due to sample file based on reservation forms the second information.
It among these include sandbox system institute since sandbox system can generate the network information during analyzing sample file The network information that the network information and sample file that the operating system itself used generates generate at runtime.This two parts network Information is usually to mix together.It can be rejected inside the network behavior information being collected into through the embodiment of the present invention Fall the network behavior information of unwanted operating system, only retains network behavior information caused by sample file, Lai Shengcheng the Two information.Then analysis report can be generated based on the second information.
After forming analysis report, the embodiment of the present invention can also store the analysis report.Such as it can be with full When sufficient preset condition, the analysis report is stored, wherein may include:
Processor 1 may determine that whether the capacity of the analysis report is less than preset threshold, if so, can then pass through storage Device 2 stores the analysis report.
It, can be to the analysis report for being lower than preset threshold in order to guarantee the utilization rate of memory space in the embodiment of the present invention It is stored, for example, the preset threshold can be the numerical value in the range of 40-100MB.
In addition, then deleting hash therein when the capacity of the analysis report is greater than preset threshold and being deposited again Storage.Or stored after compression processing being carried out to analysis report, it thereby may be ensured that the validity of storage.
Above-mentioned configuration based on the embodiment of the present invention can be gone in the virtual machine Windows operating system that sandbox system starts When analyzing sample file, the behavior of these operating systems itself is filtered out, thus for sandbox system when analyzing sample file The garbage that virtual machine Windows operating system generates is deleted, and can miss some operating systems to solve the prior art The network information of itself, the problem of also accidentally intercepting the network information of some samples itself.
, can be when the virtual machine Windows operating system that sandbox system starts remove analysis sample file using the present invention, mistake The behavior of these operating systems itself is filtered, so that virtual machine Windows is operated when analyzing sample file for sandbox system The garbage that system generates is deleted.After analyzing a sample in virtual machine Windows system, go to handle its network Behavioural information.
Above embodiments are only exemplary embodiment of the present invention, are not used in the limitation present invention, protection scope of the present invention It is defined by the claims.Those skilled in the art can within the spirit and scope of the present invention make respectively the present invention Kind modification or equivalent replacement, this modification or equivalent replacement also should be regarded as being within the scope of the present invention.

Claims (10)

1. a kind of sandbox reports filter method characterized by comprising
Sample file is run under predetermined registration operation environment;
Obtain the first information generated when running the sample file;
Processing is filtered to the first information based on pre-set criteria, forms the second information;
Analysis report is formed based on second information.
2. according to the method described in claim 1, wherein, before running sample file under predetermined registration operation environment further include:
Obtain sample file.
3. according to the method described in claim 1, wherein, it includes following for obtaining the first information generated when running the sample file It is at least one:
It obtains and generates API Calls record when running the sample file, screenshot takes off record and network data recording;
The deletion record of file, newly-built record and Download History when detection runs the sample file;
Obtain the memory mirror of sample file;
System full memory mirror image when obtaining operation sample file.
4. according to the method described in claim 1, wherein, being filtered processing, shape to the first information based on pre-set criteria Include: at the second information
Obtain the behavioural information in the sample file operational process;
Filter the network behavior information in the behavioural information due to operating system itself;
The network behavior information generated due to sample file based on reservation forms the second information.
5. according to the method described in claim 1, wherein, the method also includes:
When meeting preset condition, the analysis report is stored.
6. according to the method described in claim 5, wherein, when meeting preset condition, storing the analysis report includes:
Judge whether the capacity of the analysis report is less than preset threshold;
If so, then storing the analysis report.
7. according to the method described in claim 6, wherein, when the capacity of the analysis report is greater than preset threshold, then deleting Hash therein is stored again.
8. a kind of sandbox reports filter device comprising:
Processor is configured to run sample file under predetermined registration operation environment, and obtains and generate when running the sample file The first information;And processing is filtered to the first information based on pre-set criteria, form the second information, and based on described the Two information form analysis report.
9. device according to claim 8, wherein the processor is further configured to run under predetermined registration operation environment Sample file, and obtain the first information generated when running the sample file;And based on pre-set criteria to the first information It is filtered processing, forms the second information, and analysis report is formed based on second information.
10. device according to claim 8, wherein the processor, which is further configured to obtain, runs the sample file When the first information that generates include following at least one:
It obtains and generates API Calls record when running the sample file, screenshot takes off record and network data recording;
The deletion record of file, newly-built record and Download History when detection runs the sample file;
Obtain the memory mirror of sample file;
System full memory mirror image when obtaining operation sample file.
CN201810209007.2A 2018-03-14 2018-03-14 Sandbox reports filter method and device Pending CN109684827A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810209007.2A CN109684827A (en) 2018-03-14 2018-03-14 Sandbox reports filter method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810209007.2A CN109684827A (en) 2018-03-14 2018-03-14 Sandbox reports filter method and device

Publications (1)

Publication Number Publication Date
CN109684827A true CN109684827A (en) 2019-04-26

Family

ID=66184408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810209007.2A Pending CN109684827A (en) 2018-03-14 2018-03-14 Sandbox reports filter method and device

Country Status (1)

Country Link
CN (1) CN109684827A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8490086B1 (en) * 2009-06-30 2013-07-16 Symantec Corporation Filtering I/O communication of guest OS by inserting filter layer between hypervisor and VM and between hypervisor and devices
CN103714137A (en) * 2013-12-19 2014-04-09 大唐移动通信设备有限公司 Method and system for deleting data files
CN103824069A (en) * 2014-03-19 2014-05-28 北京邮电大学 Intrusion detection method based on multi-host-log correlation
CN107729751A (en) * 2016-08-12 2018-02-23 阿里巴巴集团控股有限公司 data detection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8490086B1 (en) * 2009-06-30 2013-07-16 Symantec Corporation Filtering I/O communication of guest OS by inserting filter layer between hypervisor and VM and between hypervisor and devices
CN103714137A (en) * 2013-12-19 2014-04-09 大唐移动通信设备有限公司 Method and system for deleting data files
CN103824069A (en) * 2014-03-19 2014-05-28 北京邮电大学 Intrusion detection method based on multi-host-log correlation
CN107729751A (en) * 2016-08-12 2018-02-23 阿里巴巴集团控股有限公司 data detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张俊: "恶意软件的取证分析方法研究", 《湖北警官学院学报》 *

Similar Documents

Publication Publication Date Title
US11625485B2 (en) Method of malware detection and system thereof
CN109831419B (en) Method and device for determining permission of shell program
KR101647487B1 (en) Analysis system and method for patch file
US9003240B2 (en) Blackbox memory monitoring with a calling context memory map and semantic extraction
CN109583200A (en) A kind of program exception analysis method based on dynamic tainting
KR20160082644A (en) Method and apparatus for detecting malware by code block classification
US20160283357A1 (en) Call stack relationship acquiring method and apparatus
Pagani et al. Introducing the temporal dimension to memory forensics
DE102012209006A1 (en) Testing web applications for security vulnerabilities when uploading files
KR20090075861A (en) On demand virus scan
CN108898012B (en) Method and apparatus for detecting illegal program
CN108038373B (en) Data scanning method and system for cloud terminal
CN105868056A (en) Method, device and safety virtual machine for acquiring deleted files in Windows virtual machines
CN107729751A (en) data detection method and device
CN105897751B (en) Threaten the generation method and device of information
KR101308866B1 (en) Open type system for analyzing and managing malicious code
CN111428240A (en) Method and device for detecting illegal access of memory of software
CN111783094A (en) Data analysis method and device, server and readable storage medium
CN109684827A (en) Sandbox reports filter method and device
JP2010134536A (en) Pattern file update system, pattern file update method, and pattern file update program
CN109684826B (en) Application sandbox anti-escape method and electronic equipment
CN106446687B (en) Malicious sample detection method and device
CN109885455A (en) A kind of data processing method and electronic equipment based on sandbox system
CN114978963A (en) Network system monitoring analysis method and device, electronic equipment and storage medium
CN111125701B (en) File detection method, equipment, storage medium and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190426

RJ01 Rejection of invention patent application after publication