[ MATT Wk 12 ] Malicious Web Pages Analysis
Malicious Websites
Malware can be delivered through the browser or operate within the browser itself.
- Leverage on HTML, JavaScript, and (nowadays) less commonly, VBScript, Flash and Java.
Protection / Detection
- Use VPNs / anonymising proxies (e.g. TOR, JonDonym)
- Use
wget/curlto download the page and analyse it offline - Use VirusTotal to scan the page
Deobfuscation
Browser scripts are often obfuscated to evade detection and complicate analysis.
Static Analysis
- Use tools like
SpiderMonkeyto deobfuscate JavaScript (on the REMnux VM)1
js -f /usr/local/etc/def.js -f malware.js > deobfuscated.js
- Use
Firebugto inspect the page DOM and JavaScript
Dynamic Analysis
- Use
Firebugto debug JavaScript- Add
debugger;at parts of the script (e.g., start of the script, before function /evalcalls etc.) - Inspect the script in the
Scripttab- Look for variable values, cookies, etc.
- Add
Common Functions used in JavaScript Browser Malware
eval- Executes a string of JavaScript codedocument.write- Writes HTML content to the pagedocument.cookie- Accesses / Sets cookies for the pagedocument.location- Accesses the URL of the pagedocument.location.host- Returns hostname and port number of the URL of the pagedocument.body- Accesses / Modifies the body of the pagedocument.createElement/document.appendChild- Add elements to browser DOM
This post is licensed under
CC BY 4.0
by the author.