Understanding how application programming interfaces (APIs) are used in a program plays an important role in malware analysis. This, however, has resulted in an endless battle between malware authors and malware analysts around the development of API [de]obfuscation techniques over the last few decades. Our goal in this paper is to show the limit of existing API de-obfuscation techniques. To do that, we first analyzed existing API [de]obfuscation techniques and clarified that an attack vector commonly exists in these techniques; then, we present Stealth Loader, which is a program loader to bypass all existing API de-obfuscation techniques. The core idea of Stealth Loader is to load a dynamic link library (DLL) and resolve its dependency without leaving any traces on memory to be detected. We demonstrated the effectiveness of Stealth Loader by analyzing a set ofWindows executables and malware protected with Stealth Loader using major dynamic and static analysis tools. The results indicate that among other obfuscation tools, only Stealth Loader is able to successfully bypass all analysis tools.
CITATION STYLE
Kawakoya, Y., Shioji, E., Otsuki, Y., Iwamura, M., & Miyoshi, J. (2018). Stealth loader: Trace-free program loading for analysis evasion. Journal of Information Processing, 26, 673–686. https://doi.org/10.2197/ipsjjip.26.673
Mendeley helps you to discover research relevant for your work.