Cuckoo – Network Analysis

Previous Post: Cuckoo Memory Analysis with Volatility

In this section we will deal with a recent malware example and also do some basic network analysis. I will try just a new malware from: Malware Clean MX – realtime.  Below is the screenshot. We will test a suspected trojan downloader. This is the first line below and it is a live threat and most of the antivirus software does not recognize it yet.



Clicking the link downloads an executable file. Now we will submit it to Cuckoo.
# cd /root/cuckoo
# utils/ samples/finstall.exe

After the analysis is complete we check the cuckoo report. It has a Virustotal detection ratio of 5/56. This is a low ratio.

When I check the import section in the static analysis I see that it seems pretty suspicious. It calls the dlls: KERNEL32.dll, USER32.dll, SHELL32.dll, etc.

After that I checked the dropped files and see that it has dropped some files:


Now lets check the DNS requests: As you see below we can see Chinese domains.

I finally want to check the network dump file and see the details there. To do it I like to use NetworkMiner. If you do not have it the installation is very easy.

NetworkMiner Installation (Debian/Ubuntu):

$ sudo apt-get install libmono-winforms2.0-cil 
$ wget -O ./
$ sudo unzip ./ -d /opt/
$ cd /opt/NetworkMiner*
$ sudo chmod +x NetworkMiner.exe
$ sudo chmod -R go+w AssembledFiles/
$ sudo chmod -R go+w Captures/

After installation also define the PATH variable so that you can run it anywhere. In your user folder edit .bashrc add the line below at the end of it (The numbers at the end will change according to the latest version.)

Now you can check dump.pcap  file. Here is the command:
# NetworkMiner.exe pathoffile/dump.pcap

Here is an example screenshot showing the download and URL of MM-liao8398.exe.


Above you can also see that you can see many details with NetworkMiner like:
– Hosts, Frames, Files, Images, Messages, Credentials, Sessions, DNS, Parameters, Keywords, Cleartext and Anomalies.

As you can see NetworkMiner is very useful checking the contents of  a pcap file. What is more extracts all the files. You can also analyse the extracted files.

I will just check the downloaded exe file here. First file info:
# file storage/analyses/40/files/5662260763/MM-liao8398.exe
storage/analyses/40/files/5662260763/MM-liao8398.exe: PE32 executable (GUI) Intel 80386, for MS Windows

Now the strings details with http:
# strings storage/analyses/40/files/5662260763/MM-liao8398.exe | grep http

As you see above this file most probably will download more files from What is more there are also strings like “open shell command”.

? The end of post ?