In their own words:
SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware. Its platform combines dynamic sandbox analysis with static analysis to leverage the best features of both. Its patented technology on forced code execution finds and executes hidden code paths that other sandboxes miss. It uses advanced neural networks that can auto-learn what suspicious code patterns to look for, without human-specified signatures. The neural networks are further enriched by its technology to detect evasive and anti-analysis features in malware.
To view the SecondWrite report make sure to check out the detailed report.
Within the detailed reports, for a quick summary, take a look at the detection scores and classifications.
Within the detailed reports, for a quick summary, take a look at the detection scores and classifications.
Malware Score |
Classification of different categories |
Let's dig a little deeper and see some more features:
Forced Code Execution (FCE)
See for example the file fcd6c16a61b286bb6951e49869fcadbc9bf83bccf31dc2e3b3c8f7ad23d6054f.Automatic Sequence Detection (ASD)
Machine learning can be very effective at finding subtle, multivariable associations that are impossible for a human to find. The most granular dataset to feed to a machine learner is sequences of assembly instructions. SecondWrite's Automatic Sequence Detection technology is able to discern instruction sequences that are only found in malicious applications and give a confidence level. It is precise enough to limit false positives, but also broad enough to not be susceptible to artificial changes injected to malware strains such as is the case with polymorphic malware. The following report shows a sample that was determined to be malicious by Automatic Sequence Detection with a 93% confidence:
https://www.virustotal.com/gui/file/520c376e726ca11d47566cbbd03f764646c4e498d76b8457e4cf28e940ca79f1/behavior/SecondWrite
Next we can click on the relations tab, we can see how it's related to other IP Addresses, Domains, and URLS.
In this graph we can see related files based on network communication, with common URLs, Domains and IP addresses:
0 comments:
Post a Comment