Trend Micro Deep Discovery Analyzer 5.0 Administrator`s Guide
Transcription
Trend Micro Deep Discovery Analyzer 5.0 Administrator`s Guide
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com Trend Micro, the Trend Micro t-ball logo, and Control Manager are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2014. Trend Micro Incorporated. All rights reserved. Document Part No.: APEM56312/140220 Release Date: April 2014 Protected by U.S. Patent No.: Patents pending. This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at docs@trendmicro.com. Evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Preface Preface .................................................................................................................. v Documentation .................................................................................................. vi Audience ............................................................................................................ vii Document Conventions .................................................................................. vii Terminology ..................................................................................................... viii About Trend Micro ........................................................................................... ix Chapter 1: Introduction About Deep Discovery Analyzer ................................................................. 1-2 New in this Release ........................................................................................ 1-2 Chapter 2: Deploying Deep Discovery Analyzer Deployment Overview ................................................................................... 2-2 Product Specifications ........................................................................... 2-2 Recommended Network Environment .............................................. 2-2 Network Settings .................................................................................... 2-4 Deployment Requirements and Checklists ................................................. 2-4 Items to Obtain from Trend Micro ..................................................... 2-4 Items to Prepare ..................................................................................... 2-5 Logon Credentials .................................................................................. 2-6 Ports Used by Deep Discovery Analyzer ........................................... 2-6 Deployment Tasks .......................................................................................... 2-8 Setting Up the Hardware ....................................................................... 2-8 Installing Deep Discovery Analyzer .................................................. 2-12 Chapter 3: Getting Started The Preconfiguration Console ...................................................................... 3-2 Preconfiguration Console Basic Operations ...................................... 3-3 i Deep Discovery Analyzer 5.0 Administrator's Guide Configuring Network Addresses on the Preconfiguration Console .................................................................................................................... 3-4 The Management Console ............................................................................ 3-7 Management Console Navigation ........................................................ 3-8 Getting Started Tasks ..................................................................................... 3-9 Integration with Trend Micro Products and Services ............................. 3-10 For Sandbox Analysis .......................................................................... 3-10 For C&C List ........................................................................................ 3-11 For Updates ........................................................................................... 3-12 Chapter 4: Dashboard Dashboard Overview ..................................................................................... 4-2 Tabs .................................................................................................................. 4-3 Tab Tasks ................................................................................................. 4-3 New Tab Window .................................................................................. 4-3 Widgets ............................................................................................................. 4-4 Widget Tasks ........................................................................................... 4-5 Virtual Analyzer Widgets ............................................................................... 4-7 Submissions Over Time ........................................................................ 4-8 Virtual Analyzer Summary .................................................................... 4-9 Suspicious Objects Added .................................................................. 4-10 Chapter 5: Virtual Analyzer Virtual Analyzer .............................................................................................. 5-2 Submissions ..................................................................................................... 5-2 Submissions Tasks .................................................................................. 5-7 Submitting Samples ................................................................................ 5-9 Detailed Information Screen .............................................................. 5-11 Manually Submitting Samples ............................................................ 5-14 Suspicious Objects ....................................................................................... 5-16 Suspicious Objects Tasks .................................................................... 5-18 Exceptions ..................................................................................................... 5-19 Exceptions Tasks .................................................................................. 5-20 ii Table of Contents Sandbox Management .................................................................................. 5-22 Status Tab .............................................................................................. 5-23 Network Connection Tab ................................................................... 5-25 Images Tab ............................................................................................ 5-27 Archive File Passwords ....................................................................... 5-32 Chapter 6: Reports Reports ............................................................................................................. 6-2 Generated Reports ................................................................................. 6-2 Report Settings ........................................................................................ 6-5 Chapter 7: Administration Updates ............................................................................................................. 7-2 Components ............................................................................................ 7-2 Update Settings ....................................................................................... 7-3 Product Updates ..................................................................................... 7-4 System Settings ................................................................................................ 7-6 Host Name and IP Address Tab .......................................................... 7-7 Proxy Settings Tab ................................................................................. 7-9 SMTP Settings Tab .............................................................................. 7-10 Date and Time Tab .............................................................................. 7-11 Password Policy Tab ............................................................................ 7-13 Session Timeout Tab ........................................................................... 7-14 Power Off / Restart Tab ..................................................................... 7-14 Log Settings ................................................................................................... 7-15 Configuring Syslog Settings ................................................................ 7-15 Account Management .................................................................................. 7-16 Add User Window ............................................................................... 7-18 Contact Management ................................................................................... 7-19 Add Contact Window .......................................................................... 7-20 Tools ............................................................................................................... 7-21 Manual Submission Tool .................................................................... 7-22 Licensing ........................................................................................................ 7-22 About Deep Discovery Analyzer ............................................................... 7-25 iii Deep Discovery Analyzer 5.0 Administrator's Guide Chapter 8: Technical Support Troubleshooting Resources .......................................................................... 8-2 Trend Community .................................................................................. 8-2 Using the Support Portal ....................................................................... 8-2 Security Intelligence Community ......................................................... 8-3 Threat Encyclopedia .............................................................................. 8-3 Contacting Trend Micro ................................................................................ 8-3 Speeding Up the Support Call .............................................................. 8-4 Sending Suspicious Content to Trend Micro ............................................. 8-5 File Reputation Services ........................................................................ 8-5 Email Reputation Services .................................................................... 8-5 Web Reputation Services ....................................................................... 8-5 Other Resources ............................................................................................. 8-5 TrendEdge ............................................................................................... 8-6 Download Center ................................................................................... 8-6 TrendLabs ................................................................................................ 8-6 Appendix A: Additional Resources Creating a Custom Virtual Analyzer Image ............................................... A-2 Downloading and Installing VirtualBox ............................................ A-2 Preparing the Operating System Installer .......................................... A-3 Creating a Custom Virtual Analyzer Image ....................................... A-4 Installing the Required Software on the Image .............................. A-16 Modifying the Image Environment .................................................. A-18 Packaging the Image as an OVA File ............................................... A-24 Importing the OVA File Into Deep Discovery Analyzer ............. A-28 Troubleshooting .................................................................................. A-28 Categories of Notable Characteristics ...................................................... A-29 Deep Discovery Inspector Rules .............................................................. A-36 Index Index .............................................................................................................. IN-1 iv Preface Preface Welcome to the Deep Discovery Analyzer Administrator’s Guide. This guide contains information about product settings and service levels. v Deep Discovery Analyzer 5.0 Administrator's Guide Documentation The documentation set for Deep Discovery Analyzer includes the following: TABLE 1. Product Documentation DOCUMENT Administrator's Guide DESCRIPTION PDF documentation provided with the product or downloadable from the Trend Micro website. The Administrator’s Guide contains detailed instructions on how to configure and manage Deep Discovery Analyzer, and explanations on Deep Discovery Analyzer concepts and features. Quick Start Guide The Quick Start Guide provides user-friendly instructions on connecting Deep Discovery Analyzer to your network and on performing the initial configuration. Readme The Readme contains late-breaking product information that is not found in the online or printed documentation. Topics include a description of new features, known issues, and product release history. Online Help Web-based documentation that is accessible from the Deep Discovery Analyzer management console. The Online Help contains explanations of Deep Discovery Analyzer components and features, as well as procedures needed to configure Deep Discovery Analyzer. Support Portal The Support Portal is an online database of problemsolving and troubleshooting information. It provides the latest information about known product issues. To access the Support Portal, go to the following website: http://esupport.trendmicro.com View and download product documentation from the Trend Micro Documentation Center: http://docs.trendmicro.com/en-us/home.aspx vi Preface Audience The Deep Discovery Analyzer documentation is written for IT administrators and security analysts. The documentation assumes that the reader has an in-depth knowledge of networking and information security, including the following topics: • Network topologies • Database management • Antivirus and content security protection The documentation does not assume the reader has any knowledge of sandbox environments or threat event correlation. Document Conventions The documentation uses the following conventions: TABLE 2. Document Conventions CONVENTION DESCRIPTION UPPER CASE Acronyms, abbreviations, and names of certain commands and keys on the keyboard Bold Menus and menu commands, command buttons, tabs, and options Italics References to other documents Monospace Sample command lines, program code, web URLs, file names, and program output Navigation > Path The navigation path to reach a particular screen For example, File > Save means, click File and then click Save on the interface Note Configuration notes vii Deep Discovery Analyzer 5.0 Administrator's Guide CONVENTION Tip Important WARNING! DESCRIPTION Recommendations or suggestions Information regarding required or default configuration settings and product limitations Critical actions and configuration options Terminology TERMINOLOGY viii DESCRIPTION ActiveUpdate A component update source managed by Trend Micro. ActiveUpdate provides up-to-date downloads of virus pattern files, scan engines, program, and other Trend Micro component files through the Internet. Administrator The person managing Deep Discovery Analyzer Custom port A hardware port that connects Deep Discovery Analyzer to an isolated network dedicated to sandbox analysis Dashboard UI screen on which widgets are displayed Management console A web-based user interface for managing a product. Management port A hardware port that connects to the management network. Sandbox image A ready-to- use software package (operating system with applications) that require no configuration or installation. Virtual Analyzer supports only image files in the Open Virtual Appliance (OVA) format. Sandbox instance A single virtual machine based on a sandbox image. Preface TERMINOLOGY DESCRIPTION Threat Connect A Trend Micro service that correlates suspicious objects detected in your environment and threat data from the Trend Micro Smart Protection Network. By providing ondemand access to Trend Micro intelligence databases, Threat Connect enables you to identify and investigate potential threats to your environment. Virtual Analyzer A secure virtual environment used to manage and analyze samples submitted by Trend Micro products. Sandbox images allow observation of file and network behavior in a natural setting. Widget A customizable screen to view targeted, selected data sets. About Trend Micro As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With over 20 years of experience, Trend Micro provides top-ranked client, server, and cloud-based solutions that stop threats faster and protect data in physical, virtual, and cloud environments. As new threats and vulnerabilities emerge, Trend Micro remains committed to helping customers secure data, ensure compliance, reduce costs, and safeguard business integrity. For more information, visit: http://www.trendmicro.com Trend Micro and the Trend Micro t-ball logo are trademarks of Trend Micro Incorporated and are registered in some jurisdictions. All other marks are the trademarks or registered trademarks of their respective companies. ix Chapter 1 Introduction This chapter introduces Trend Micro™ Deep Discovery Analyzer 5.0 and the new features in this release. 1-1 Deep Discovery Analyzer 5.0 Administrator's Guide About Deep Discovery Analyzer Trend Micro Deep Discovery Analyzer™ is an open, scalable sandboxing analysis platform that provides on-premise, on-demand analysis of file and URL samples. Deep Discovery Analyzer supports out-of-the-box integration with Trend Micro products such as InterScan Messaging Security, InterScan Web Security, ScanMail for Microsoft Exchange, ScanMail for IBM Domino, and Deep Discovery Inspector. The Deep Discovery Analyzer also processes samples manually submitted by threat researchers and incident response professionals. An open Web Services Interface enables any product or process to submit samples and obtain detailed results in a timely manner. Custom sandboxing supports environments that precisely match target desktop software configurations—resulting in more accurate detections and fewer false positives. New in this Release TABLE 1-1. New in Deep Discovery Analyzer 5.0 FEATURE/ ENHANCEMENT 1-2 DETAILS Scalable sandboxing services Optimized performance across an array of sandbox instances enables keeping pace with email, network, endpoint, and other sample sources. Custom sandboxing Deep Discovery Analyzer conducts sample simulation and analysis using environments that precisely match your desktop operating system and application configurations. Broad file analysis range Deep Discovery Analyzer examines samples using multiple detection engines as well as dynamic analysis methods. Supported file types include a wide range of Windows executable files, Microsoft Office and Adobe PDF documents, web content, and archive files. Introduction FEATURE/ ENHANCEMENT DETAILS Advanced email and file analysis Deep Discovery Analyzer analyzes email URL references using web reputation, page analysis, and web sandboxing. Heuristics and customer-supplied keywords are used when decompressing files. Detailed reporting Deep Discovery Analyzer provides full analysis results that include detailed sample activities and C&C communications. The results are also available from the central dashboard and are included in reports. Open IOC intelligence sharing Deep Discovery Analyzer automatically shares new detection intelligence including C&C and other IOC information with other security products. 1-3 Chapter 2 Deploying Deep Discovery Analyzer This chapter discusses the tasks you need to perform to successfully deploy Deep Discovery Analyzer and connect it to your network. If Deep Discovery Analyzer has already been deployed on your network and you have a patch, service pack, or hotfix to apply to it, refer to Product Updates on page 7-4 for detailed information about how to apply the update. 2-1 Deep Discovery Analyzer 5.0 Administrator's Guide Deployment Overview Product Specifications The standard Deep Discovery Analyzer appliance has the following specifications. FEATURE SPECIFICATIONS Rack size 2U 19-inch standard rack Availability Raid 5 configuration Storage size 2 TB free storage Connectivity • Network: 2 x 1 GB/100/10Base copper • Management: 1 x 1 GB/100/10Base copper Dimensions (WxDxH) 48.2 cm (18.98 in) x 75.58 cm (29.75 in) x 8.73 cm (3.44 in) Maximum weight 32.5kg (71.65lb) Operating temperature 10 °C to 35 °C at 10% to 80% relative humidity (RH) Power 750W , 120-240 VAC 50/60 HZ Contact Trend Micro if the appliance you are using does not meet these hardware specifications. Recommended Network Environment Deep Discovery Analyzer requires connection to a management network, which usually is the organization’s intranet. After deployment, administrators can perform configuration tasks from any computer on the management network. Trend Micro Trend Micro recommends using a custom network for sample analysis. Custom networks ideally are connected to the Internet but do not have proxy settings, proxy authentication, and connection restrictions. 2-2 Deploying Deep Discovery Analyzer The networks must be independent of each other so that malicious samples in the custom network do not affect hosts in the management network. 2-3 Deep Discovery Analyzer 5.0 Administrator's Guide Network Settings Ports are found at the back of the appliance, as shown in the following image. Network interface ports include: • Management port (eth0): Connects the appliance to the management network • Custom ports (eth1, eth2, eth3): Connect the appliance to isolated networks that are reserved for sandbox analysis Deep Discovery Analyzer requires one available static IP address in the management network. If sandbox instances require Internet connectivity during sample analysis, Trend Micro recommends allocating one extra IP address for Virtual Analyzer. The Sandbox Management > Network Connection screen allows you to specify static or DHCP addresses. For more information, see Enabling External Connections on page 5-25. Deployment Requirements and Checklists Items to Obtain from Trend Micro 2-4 1. Deep Discovery Analyzer appliance 2. Deep Discovery Analyzer installation CD Deploying Deep Discovery Analyzer 3. Activation Code Items to Prepare REQUIREMENT DETAILS Monitor and VGA cable Connects to the VGA port of the appliance USB keyboard Connects to the USB port of the appliance USB mouse Connects to the USB port of the appliance Ethernet cables • One cable connects the management port of the appliance to the management network. • One cable connects a custom port to an isolated network that is reserved for sandbox analysis. Internet-enabled computer IP addresses A computer with the following software installed: • Microsoft Internet Explorer 9 or 10, or Mozilla Firefox • Adobe Flash 10 or later • One static IP address in the management network • If sandbox instances require Internet connectivity, one extra IP address for Virtual Analyzer 2-5 Deep Discovery Analyzer 5.0 Administrator's Guide Logon Credentials CONSOLE PURPOSE Preconfiguratio n console Perform initial configuration tasks. See Configuring Network Addresses on the Preconfiguration Console on page 3-4. DEFAULT CREDENTIALS • • Deep Discovery Analyzer login (not configurable ): admin YOUR INFORMATION Password: Password: admin Management console • Configure product settings • View and download reports See The Management Console on page 3-7. • • User name (not configurable ): admin Password: Password: Admin1234! Other user accounts (configured on the management console, in Administration > Account Management) User account 1: User name: Password: User account 2: User name: Password: Ports Used by Deep Discovery Analyzer The following table shows the ports that are used with Deep Discovery Analyzer and why they are used. 2-6 Deploying Deep Discovery Analyzer PORT PROTOCOL FUNCTION PURPOSE 25 TCP Outbound Deep Discovery Analyzer sends reports through SMTP. 53 TCP/UDP Outbound Deep Discovery Analyzer uses this port for DNS resolution. 67 UDP Outbound Deep Discovery Analyzer sends requests to the DHCP server if IP addresses are assigned dynamically. 68 UDP Inbound Deep Discovery Analyzer receives responses from the DHCP server. 80 TCP Inbound and outbound Deep Discovery Analyzer connects to other computers and integrated Trend Micro products and hosted services through this port. In particular, it uses this port to: • Update components by connecting to the ActiveUpdate server • Connect to the Smart Protection Network when analyzing file samples • Receive requests from integrated products to download the C&C list Note The C&C list is a subset of the Suspicious Objects list. 2-7 Deep Discovery Analyzer 5.0 Administrator's Guide PORT 443 PROTOCOL TCP FUNCTION Inbound and outbound PURPOSE Deep Discovery Analyzer uses this port to: • Receive samples from integrated products for sandbox analysis • Access the management console with a computer through HTTPS • Receive files from a computer with the Manual Submission Tool Deployment Tasks Procedure 1. Prepare the appliance for installation. For more information. see Setting Up the Hardware on page 2-8. 2. Install Deep Discovery Analyzer. For more information, see Installing Deep Discovery Analyzer on page 2-12 3. Configure the IP address of the appliance on the preconfiguration console. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4. Setting Up the Hardware Procedure 1. 2-8 Mount the appliance in a standard 19-inch 4-post rack, or on a free-standing object, such as a sturdy desktop. Deploying Deep Discovery Analyzer Note When mounting the appliance, leave at least two inches of clearance on all sides for proper ventilation and cooling. 2. Connect the appliance to a power source. Deep Discovery Analyzer includes two 750-watt hot-plug power supply units. One acts as the main power supply and the other as a backup. The corresponding AC power slots are located at the back of the appliance, as shown in the following image. 3. Connect the monitor to the VGA port at the back of the appliance. 4. Connect the keyboard and mouse to the USB ports at the back of the appliance. 5. Connect the Ethernet cables to the management and custom ports. 6. • Management port: A hardware port that connects Deep Discovery Analyzer to the management network • Custom port: A hardware port that connects Deep Discovery Analyzer to an isolated network dedicated to sandbox analysis Power on the appliance. Note The power button is found on the front panel of the appliance, behind the bezel. 2-9 Deep Discovery Analyzer 5.0 Administrator's Guide The power-on self-test (POST) screen appears. 7. Insert the CD containing the Deep Discovery Analyzer installation package. 8. Restart the appliance. The POST screen appears. 9. 2-10 Press F11. Deploying Deep Discovery Analyzer The Boot Manager screen appears. 10. Under Boot Manager Main Menu, select BIOS Boot Menu and press ENTER. The BIOS Boot Manager screen appears. 11. Select PLDS DVD-ROM DS-8D3SH and press ENTER. 2-11 Deep Discovery Analyzer 5.0 Administrator's Guide The Deep Discovery Analyzer Installation screen appears. Installing Deep Discovery Analyzer Procedure 1. 2-12 On the Deep Discovery Analyzer Installation screen, select 1. Install Appliance and press ENTER. Deploying Deep Discovery Analyzer The Welcome screen appears. 2. Press F12. 2-13 Deep Discovery Analyzer 5.0 Administrator's Guide The installation program checks for available installation media. If installation media is located, the Trend Micro License Agreement screen appears. 3. 2-14 Click Accept. Deploying Deep Discovery Analyzer The Select Drive screen appears. 4. Select at least one drive on which the Deep Discovery Analyzer software is to be installed. WARNING! Installation involves repartitioning of the storage device. All data on the device will be lost. 2-15 Deep Discovery Analyzer 5.0 Administrator's Guide A confirmation message appears. 5. Click Yes to continue. The program checks if the minimum hardware requirements are met, and then displays the hardware summary screen. 2-16 Deploying Deep Discovery Analyzer Note Deep Discovery Analyzer requires at least: 6. • 8 GB RAM • 400 GB available disk space • At least two CPUs • One Ethernet network interface card Click Next. The Installation Summary screen appears. 7. Review the installation summary. 2-17 Deep Discovery Analyzer 5.0 Administrator's Guide WARNING! Installation involves repartitioning of the storage device. All data on the storage device will be lost. You can change the host name, IP address, and date/time settings on the management console after all deployment tasks are completed. If you are unable to access the default IP address 192.168.252.2, use the preconfiguration console to modify the host name and IP address. 8. Click Next. A confirmation message appears. 9. Click Continue. The installation program formats the storage device and prepares the environment for installation. Upon completion, the appliance is restarted and the Deep Discovery Analyzer software is installed. 2-18 Chapter 3 Getting Started This chapter describes how to get started with Deep Discovery Analyzer and configure initial settings. 3-1 Deep Discovery Analyzer 5.0 Administrator's Guide The Preconfiguration Console The preconfiguration console is a Bash-based (Unix shell) interface used to configure network settings and ping remote hosts. The following table describes the tasks performed on the preconfiguration console. TASK Logging on 3-2 PROCEDURE Type valid logon credentials. The default credentials are: • User name: admin • Password: admin Configuring network addresses for the appliance Specify the appliance IP address, subnet mask, gateway, and DNS. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4 Pinging a remote host Type a valid IP address or FQDN and click Ping. Getting Started TASK PROCEDURE Changing the preconfiguration console password Type the new password twice and click Save. Logging off On the Main Menu, click Log off. Preconfiguration Console Basic Operations Use the following keyboard keys to perform basic operations on the preconfiguration console. Important Disable scroll lock (using the Scroll Lock key on the keyboard) to perform the following operations. KEYBOARD KEY Up and Down arrows OPERATION Move between fields. Move between items in a numbered list. Note An alternative way of moving to an item is by typing the item number. Move between text boxes. Left and Right arrows Move between buttons. Buttons are enclosed in angle brackets <>. Move between characters in a text box. 3-3 Deep Discovery Analyzer 5.0 Administrator's Guide KEYBOARD KEY OPERATION Enter Click the highlighted item or button. Tab Move between screen sections, where one section requires using a combination of arrow keys (Up, Down, Left, and Right keys). Configuring Network Addresses on the Preconfiguration Console Procedure 1. Type valid logon credentials. The default credentials are: • User name: admin • Password: admin Note None of the characters you typed will appear on the screen. This password is different from the password used to log on to the web-based management console. For more information, see Deep Discovery Analyzer Logon Credentials on page 2-6. 3-4 Getting Started The Main Menu screen appears. 2. Select Configure device IP address and press Enter. The Management Server Static IP Settings screen appears. 3. Specify the following: 3-5 Deep Discovery Analyzer 5.0 Administrator's Guide Item Guidelines IP address Must not conflict with the following addresses: • Sandbox network: Configured in Virtual Analyzer > Sandbox Management > Network Connection • Virtual Analyzer: 1.1.0.0 - 1.1.2.255 • Broadcast: 255.255.255.255 • Multicast: 224.0.0.0 - 239.255.255.255 • Link local: 169.254.1.0 - 169.254.254.255 • Class E: 240.0.0.0 - 255.255.255.255 • Localhost: 127.0.0.1/8 Note Changing the IP address changes the management console URL. Subnet mask 4. Must not be any of the following addresses: • 000.000.000.000 • 111.111.111.111 Gateway Must be in the same subnet as the IP address DNS 1 Same as IP address DNS 2 (Optional) Same as IP address Press the Tab key to navigate to Save, and then press Enter. The Main Menu screen appears after the settings are successfully saved. 3-6 Getting Started The Management Console Deep Discovery Analyzer provides a built-in management console for configuring and managing the product. Open the management console from any computer on the management network with the following resources: • Internet Explorer 9 and 10 • Firefox • Adobe Flash 10 or later To log on, open a browser window and type the following URL: https://<Deep Discovery Analyzer IP Address>/pages/login.php This opens the logon screen, which shows the following options: 3-7 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 3-1. Management Console Logon Options OPTION User name Password DETAILS Type the logon credentials (user name and password) for the management console. Use the default administrator logon credentials when logging on for the first time: • User name: admin • Password: Admin1234! Trend Micro recommends changing the password after logging on to the management console for the first time. Configure user accounts to allow other users to access the management console without using the administrator account. For more information, see Account Management on page 7-16. Session duration Choose how long you would like to be logged on. • Default: 10 minutes • Extended: 1 day To change these values, navigate to Administration > System Settings and click the Session Timeout tab. Log On Click Log On to log on to the management console. Management Console Navigation The management console consists of the following elements: 3-8 Getting Started TABLE 3-2. Management Console Elements SECTION Banner DETAILS The management console banner contains: • Product logo and name: Click to go to the dashboard. For more information, see Dashboard Overview on page 4-2. • Name of the user currently logged on to the management console • Log Off link: Click to end the current console session and return to the logon screen. Main Menu Bar The main menu bar contains several menu items that allow you to configure product settings. For some menu items, such as Dashboard, clicking the item opens the corresponding screen. For other menu items, submenu items appear when you click or mouseover the menu item. Clicking a submenu item opens the corresponding screen. Scroll Up and Arrow Buttons Use the Scroll up option when a screen’s content exceeds the available screen space. Next to the Scroll up button is an arrow button that expands or collapses the bar at the bottom of the screen. Context-sensitive Help Use Help to find more information about the screen that is currently displayed. Getting Started Tasks Procedure 1. Activate the product license using a valid Activation Code. For more information, see Licensing on page 7-22. 2. Specify the Deep Discovery Analyzer host name and IP address. For more information, see Host Name and IP Address Tab on page 7-7. 3. Configure proxy settings if Deep Discovery Analyzer connects to the management network or Internet through a proxy server. For more information, see Proxy Settings Tab on page 7-9. 3-9 Deep Discovery Analyzer 5.0 Administrator's Guide 4. Configure date and time settings to ensure that Deep Discovery Analyzer features operate as intended. For more information, see Date and Time Tab on page 7-11. 5. Configure SMTP Settings to enable sending of notifications through email. For more information, see SMTP Settings Tab on page 7-10. 6. Import sandbox instances to Virtual Analyzer. For more information, see Importing an Image on page 5-28. 7. Configure Virtual Analyzer network settings to enable sandbox instances to connect to external destinations. For more information, see Enabling External Connections on page 5-25. Integration with Trend Micro Products and Services Deep Discovery Analyzer integrates with the Trend Micro products and services listed in the following tables. For Sandbox Analysis Products that can send samples to Deep Discovery Analyzer Virtual Analyzer for sandbox analysis: Note All samples display on the Deep Discovery Analyzer management console, in the Submissions screen (Virtual Analyzer > Submissions). Deep Discovery Analyzer administrators can also manually send samples from this screen. 3-10 Getting Started PRODUCT/SUPPORTED VERSIONS Deep Discovery Inspector • 3.5 • 3.6 INTEGRATION REQUIREMENTS AND TASKS On the management console of the integrating product, go to the appropriate screen (see the product documentation for information on which screen to access) and specify the following information: • API key. This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. • Deep Discovery Analyzer IP address. If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. • Deep Discovery Analyzer SSL port 443. This is not configurable. ScanMail for Microsoft Exchange 11.0 ScanMail for IBM Domino 5.6 InterScan Messaging Security Virtual Appliance (IMSVA) • 8.2 Service Pack 2 • 8.5 InterScan Web Security Virtual Appliance (IWSVA) 6.0 Note Some integrating products require additional configuration to integrate with Deep Discovery Analyzer properly. See the product documentation for more information. For C&C List Products that retrieve the C&C list from Deep Discovery Analyzer Virtual Analyzer: Note Products use the C&C list to detect C&C callback events. The C&C list is a subset of the Suspicous Objects list available in the Deep Discovery Analyzer management console, in Virtual Analyzer > Suspicious Objects. 3-11 Deep Discovery Analyzer 5.0 Administrator's Guide PRODUCT/SUPPORTED VERSIONS On the management console of the integrating product, go to the appropriate screen (see the product documentation for information on which screen to access) and specify the following information: Deep Discovery Inspector • 3.5 • 3.6 INTEGRATION REQUIREMENTS AND TASKS Standalone Smart Protection Server 2.6 with the latest patch • API key. This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. • Deep Discovery Analyzer IP address. If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. • Deep Discovery Analyzer SSL port 443. This is not configurable. OfficeScan Integrated Smart Protection Server • 10.6 Service Pack 2 Patch 1 InterScan Web Security Virtual Appliance (IWSVA) 6.0 Note Some of the integrating products require additional configuration to integrate with Deep Discovery Analyzer properly. See the product documentation for more information. For Updates Services which Deep Discovery Analyzer can use to obtain pattern, engine, and other component updates: SERVICE Trend Micro ActiveUpdate server 3-12 SUPPORTED VERSIONS Not applicable INTEGRATION REQUIREMENTS AND TASKS Configure the ActiveUpdate server as update source. See Updates on page 7-2. Chapter 4 Dashboard This chapter describes the Trend Micro™ Deep Discovery Analyzer dashboard. 4-1 Deep Discovery Analyzer 5.0 Administrator's Guide Dashboard Overview Monitor your network integrity with the dashboard. Each management console user account has an independent dashboard. Any changes to a user account’s dashboard does not affect other user accounts' dashboards. The dashboard consists of the following user interface elements: • Tabs provide a container for widgets. For more information, see Tabs on page 4-3. • Widgets represent the core dashboard components. For more information, see Widgets on page 4-4. Note The Add Widget button appears with a star when a new widget is available. Click Play Tab Slide Show to show a dashboard slide show. 4-2 Dashboard Tabs Tabs provide a container for widgets. Each tab on the dashboard can hold up to 20 widgets. The dashboard itself supports up to 30 tabs. Tab Tasks The following table lists all the tab-related tasks: TASK Add a tab STEPS Click the plus icon ( ) on top of the dashboard. The New Tab window displays. For more information, see New Tab Window on page 4-3. Edit tab settings Click Tab Settings. A window similar to the New Tab window opens, where you can edit settings. Move tab Use drag-and-drop to change a tab’s position. Delete tab Click the delete icon ( ) next to the tab title. Deleting a tab also deletes all the widgets in the tab. New Tab Window The New Tab window opens when you add a new tab in the dashboard. 4-3 Deep Discovery Analyzer 5.0 Administrator's Guide This window includes the following options: TABLE 4-1. New Tab Options TASK STEPS Title Type the name of the tab. Layout Choose from the available layouts. Widgets Widgets are the core components of the dashboard. Widgets contain visual charts and graphs that allow you to track threats and associate them with the logs accumulated from one or several log sources. 4-4 Dashboard Widget Tasks The following table lists widget-related tasks: TASK STEPS Add a widget Open a tab and then click Add Widgets at the top right corner of the tab. The Add Widgets screen displays. For more information, see Adding Widgets to the Dashboard on page 4-6. Refresh widget data Click the refresh icon ( Delete a widget Click the delete icon ( ). This action removes the widget from the tab that contains it, but not from the other tabs that contain it or from the widget list in the Add Widgets screen. Change time period If available, click the dropdown box on top of the widget to change the time period. ). 4-5 Deep Discovery Analyzer 5.0 Administrator's Guide TASK STEPS Move a widget Use drag-and-drop to move a widget to a different location within the tab. Resize a widget To resize a widget, point the cursor to the right edge of the widget. When you see a thick vertical line and an arrow (as shown in the following image), hold and then move the cursor to the left or right. Only widgets on multi-column tabs can be resized. These tabs have any of the following layouts and the highlighted sections contain widgets that can be resized. Adding Widgets to the Dashboard The Add Widgets screen appears when you add widgets from a tab on the dashboard. Do any of the following: 4-6 Dashboard Procedure • To reduce the widgets that appear, click a category from the left side. • To search for a widget, specify the widget name in the search text box at the top. • To change the widget count per page, select a number from the Records dropdown menu. • To switch between the Detailed and Summary views, click the display icons ) at the top right. ( • To select the widget to add the dashboard, select the check box next to the widget's title. • To add selected widgets, click Add. Virtual Analyzer Widgets 4-7 Deep Discovery Analyzer 5.0 Administrator's Guide Submissions Over Time This widget plots the number of samples submitted to Virtual Analyzer over a period of time. The default time period is Last 24 Hours. Change the time period according to your preference. Click View Submissions to open the Submissions screen and view detailed information. For more information, see Submissions on page 5-2. 4-8 Dashboard Virtual Analyzer Summary This widget shows the total number of samples submitted to Virtual Analyzer and how much of these samples have risks. The default time period is Last 24 Hours. Change the time period according to your preference. Click a number to open the Submissions screen and view detailed information. For more information, see Submissions on page 5-2. 4-9 Deep Discovery Analyzer 5.0 Administrator's Guide Suspicious Objects Added This widget plots the number of objects (IP addresses, URLs, and SHA-1) added to the suspicious objects list on the current day and on all the previous 30 days. Click View Suspicious Objects to open the Suspicious Objects screen and view detailed information. 4-10 Chapter 5 Virtual Analyzer This chapter describes the Virtual Analyzer. 5-1 Deep Discovery Analyzer 5.0 Administrator's Guide Virtual Analyzer Virtual Analyzer tracks and analyzes samples submitted by users or other Trend Micro products. It works in conjunction with Threat Connect, the Trend Micro service that correlates suspicious objects detected in your environment and threat data from the Smart Protection Network. Submissions The Submissions screen, in Virtual Analyzer > Submissions, includes a list of samples processed by Virtual Analyzer. Samples are files and URLs submitted automatically by Trend Micro products or manually by Deep Discovery Analyzer administrators. The Submissions screen organizes samples into the following tabs: • 5-2 Completed: • Samples that Virtual Analyzer has analyzed • Samples that have gone through the analysis process but do not have analysis results due to errors • Processing: Samples that Virtual Analyzer is currently analyzing • Queued: Samples that are pending analysis Virtual Analyzer On the tabs in the screen, check the following columns for basic information about the submitted samples: TABLE 5-1. Submissions Columns INFORMATION COLUMN NAME AND TAB WHERE SHOWN Risk Level (Completed tab only) FILE/EMAIL MESSAGE SAMPLE URL SAMPLE Virtual Analyzer performs static analysis and behavior simulation to identify a sample’s characteristics. During analysis, Virtual Analyzer rates the characteristics in context and then assigns a risk level to the sample based on the accumulated ratings. • Red icon ( ): High risk. The sample exhibited highly suspicious characteristics that are commonly associated with malware. Examples: • • Malware signatures; known exploit code • Disabling of security software agents • Connection to malicious network destinations • Self-replication; infection of other files • Dropping or downloading of executable files by documents Orange icon ( ): Medium risk. The sample exhibited moderately suspicious characteristics that are also associated with benign applications. • Modification of startup and other important system settings • Connection to unknown network destinations; opening of ports 5-3 Deep Discovery Analyzer 5.0 Administrator's Guide INFORMATION COLUMN NAME AND TAB WHERE SHOWN FILE/EMAIL MESSAGE SAMPLE • Unsigned executable files • Memory residency • Self-deletion URL SAMPLE • Yellow icon ( ): Low risk. The sample exhibited mildly suspicious characteristics that are most likely benign. • Green icon ( ): No risk. The sample did not exhibit suspicious characteristics. • Gray icon ( ): Not analyzed For possible reasons why Virtual Analyzer did not analyze a file, see Table 5-2: Possible Reasons for Analysis Failure on page 5-7. Note If a sample was processed by several instances, the icon for the most severe risk level displays. For example, if the risk level on one instance is yellow and then red on another instance, the red icon displays. Mouseover the icon for more information about the risk level. Completed Date and time that sample analysis was completed (Completed tab only) Event Logged • For samples submitted by other Trend Micro products, the date and time the product dispatched the sample • For manually submitted samples, the date and time Deep Discovery Analyzer received the sample (All tabs) Elapsed Time (Processing tab only) 5-4 How much time has passed since processing started Virtual Analyzer INFORMATION COLUMN NAME AND TAB WHERE SHOWN Time in Queue (Queued tab only) FILE/EMAIL MESSAGE SAMPLE How much time has passed since Virtual Analyzer added the sample to the queue Source / Sender Where the sample originated (All tabs) • IP address for network traffic or email address for email • No data (indicated by a dash) if manually submitted Destination / Recipient Where the sample is sent • IP address for network traffic or email address for email • No data (indicated by a dash) if manually submitted • Protocol used for sending the sample, such as SMTP for email or HTTP for network traffic • “Manual Submission” if manually submitted (All tabs) Protocol (Completed tab only) File Name / Email Subject / URL URL SAMPLE File name or email subject of the sample (All tabs) N/A N/A N/A URL Note Deep Discovery Analyzer may have normalized the URL. Submitter (Completed tab only) • Name of the Trend Micro product that submitted the sample "Manual Submission" 5-5 Deep Discovery Analyzer 5.0 Administrator's Guide INFORMATION COLUMN NAME AND TAB WHERE SHOWN FILE/EMAIL MESSAGE SAMPLE • Submitter Name / IP Threat Name (Completed tab only) SHA-1 / Message ID "Manual Submission" if manually submitted • Host name or IP address of the Trend Micro product that submitted the sample • "Manual Submission" if manually submitted (All tabs) URL SAMPLE Note Trend Micro products currently do not send URLs as samples. "Manual Submission" Note Trend Micro products currently do not send URLs as samples. Name of threat as detected by Trend Micro pattern files and other components N/A Unique identifier for the sample SHA-1 value of the URL • SHA-1 value if the sample is a file • Message ID if the sample is an email message (All tabs) If the Risk Level column generates a gray icon ( ), Virtual Analyzer has not analyzed the file. The following table lists possible reasons for analysis failure and identifies actions you can take. 5-6 Virtual Analyzer TABLE 5-2. Possible Reasons for Analysis Failure REASON Unsupported file type ACTION To request a list of supported file types, contact Trend Micro support. Note If a file has multiple layers of encrypted compression (for example, encrypted compressed files within a compressed file), Virtual Analyzer will be unable to analyze the file, and displays the "Unsupported File Type" error. Microsoft Office 2007/2010 not installed on the sandbox image Verify that Microsoft Office 2007 or 2010 has been installed on the sandbox by going to Virtual Analyzer > Sandbox Management. For more information, see Sandbox Management on page 5-22. Unable to simulate sample on the operating system Verify that Deep Discovery Analyzer supports the operating system installed on the sandbox image. For more information, see Creating a Custom Virtual Analyzer Image on page A-2. Unable to extract archive content using the userdefined password list Check the password list in Virtual Analyzer > Sandbox Management > Archive Passwords tab. Internal error (with error number) occurred Please contact your support provider. Submissions Tasks The following table lists all the Suspicious Objects tab tasks: 5-7 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 5-3. Submissions Tasks TASK Submit Samples STEPS Click Submit when you are done and then check the status in the Processing or Queued tab. When the sample has been analyzed, it appears in the Completed tab. For more information, see Submitting Samples on page 5-9. To manually submit multiple files at once, use the Manual Submission Tool. See Manually Submitting Samples on page 5-14. Detailed Information Screen On the Completed tab, click anywhere on a row to view detailed information about the submitted sample. A new section below the row shows the details. For more information, see Detailed Information Screen on page 5-11. Data Filters If there are too many entries in the table, limit the entries by performing these tasks: • Select a risk level in the Risk level dropdown box. • Select a column name in the Search column dropdown box, type some characters in the Search keyword text box next to it, and then press Enter. Deep Discovery Analyzer searches only the selected column in the table for matches. • The Time range dropdown box limits the entries according to the specified timeframe. If no timeframe is selected, the default configuration of 24 hours is used. This information only appears on the Completed tab. All timeframes indicate the time used by Deep Discovery Analyzer. 5-8 Virtual Analyzer TASK STEPS Records and Pagination Controls The panel at the bottom of the screen shows the total number of samples. If all samples cannot be displayed at the same time, use the pagination controls to view the samples that are hidden from view. Submitting Samples Procedure 1. Go to Virtual Analyzer > Submissions. 2. Click Submit Samples. 5-9 Deep Discovery Analyzer 5.0 Administrator's Guide The Submit Samples screen appears. 3. 4. Select a sample type: Sample Type Details and Instructions File Click Browse and then locate the sample. Single URL Type the URL in the text box provided. URL list Prepare a TXT or CSV file with a list of URLs (HTTP or HTTPS) in the first column of the file. When the file is ready, drag and drop the file in the Select file field or click Browse and then locate the file. Click Submit. Note To manually submit multiple files at once, use the Manual Submission Tool. For more information, see Manually Submitting Samples on page 5-14. 5-10 Virtual Analyzer Detailed Information Screen On the Completed tab, click anywhere on a row to view detailed information about the submitted sample. A new section below the row shows the details. The following fields are displayed on this screen: 5-11 Deep Discovery Analyzer 5.0 Administrator's Guide INFORMATION FIELD NAME Submission details FILE/EMAIL MESSAGE SAMPLE • Basic data fields (such as Logged and FileName) extracted from the raw logs • Sample ID (FileHash) • Child files, if available, contained in or generated from the submitted sample • The See full submission log... link that shows all the data fields in the raw logs URL SAMPLE • The following is a preview of the fields: • URL Note Deep Discovery Analyzer may have normalized the URL. Notable characteristics • • The categories of notable characteristics that the sample exhibits, which can be any or all of the following: • Anti-security, self-preservation • Autostart or other system reconfiguration • Deception, social engineering • File drop, download, sharing, or replication • Hijack, redirection, or data theft • Malformed, defective, or with known malware traits • Process, service, or memory object change • Rootkit, cloaking • Suspicious network or messaging activity • Other notable characteristic A number link that, when opened, shows the actual notable characteristics For more information about, see Categories of Notable Characteristics on page A-29. 5-12 Virtual Analyzer INFORMATION FIELD NAME Other submission logs Reports FILE/EMAIL MESSAGE SAMPLE URL SAMPLE A table that shows the following information about other log submissions: • Logged • Protocol • Direction • Source IP • Source Host Name • Destination IP • Destination Host Name Links to interactive HTML reports for a particular sample Note An unclickable link means there are errors during simulation. Mouseover the link to view details about the error. Investigation package • Operational Report link: Click this link to view a high-level, summarized report about the sample and the analysis results. • Comprehensive reports: Click the Consolidated link to access a detailed report. If there are several environments (sandboxes) used for simulation, the detailed report combines the results from all environments. A Download package link to a password-protected investigation package that you can download to perform additional investigations The package includes files in OpenIOC format that describe Indicators of Compromise (IOC) identified on the affected host or network. IOCs help administrators and investigators analyze and interpret threat data in a consistent manner. 5-13 Deep Discovery Analyzer 5.0 Administrator's Guide FIELD NAME Global intelligence INFORMATION FILE/EMAIL MESSAGE SAMPLE URL SAMPLE A View in Threat Connect link that opens Trend Micro Threat Connect The page contains detailed information about the sample. Manually Submitting Samples The Manual Submission Tool can be used along with Deep Discovery Analyzer to remotely submit samples from locations on users' computers to Virtual Analyzer. This feature allows users to submit multiple samples at once, which will be added to the Virtual Analyzer Submissions queue. Procedure 1. 2. Record the following information to use with the Manual Submission Tool: • API key: This is available on the Deep Discovery Analyzer management console, in Administration > About Deep Discovery Analyzer. • Deep Discovery Analyzer IP address: If unsure of the IP address, check the URL used to access the Deep Discovery Analyzer management console. The IP address is part of the URL. Download the Manual Submission Tool from the Trend Micro Software Download Center. The tool can be found here: http://downloadcenter-origin.trendmicro.com/ index.php?regs=NABU&clk=latest&clkval=4538&lang_loc=1. Under File Name, click on submission-v.1.2.6.zip, and then click Use HTTP Download in the popup window. 5-14 Virtual Analyzer 3. Extract the tool package. 4. In the folder where the tool had been extracted to, open config.ini. 5. Next to Host, type the Deep Discovery Analyzer IP address. Next to ApiKey, type the Deep Discovery Analyzer API Key. Save config.ini. 6. Return to the tool package folder, open the work folder, and then place all of the sample files into the indir folder. 7. Run cmd.exe, and change the directory (cd) to the tool package folder. 5-15 Deep Discovery Analyzer 5.0 Administrator's Guide 8. Execute dtascli -u to upload all of the files in the work/indir folder to Virtual Analyzer. Tip Execute dtascli -h for help. After executing dtascli -u, cmd.exe shows the following, along with all of the files that were uploaded from the work/indir folder. 9. After uploading the files to Virtual Analyzer, confirm that they are being analyzed in the Management Console. Click Virtual Analyzer > Submissions to locate the files. Shortly after submitting the files, before they have been analyzed, they appear in the Processing or Queued tab. When the samples have been analyzed, they appear in the Completed tab. Suspicious Objects Suspicious objects are known or potentially malicious IP addresses, domains, URLs, and SHA-1 values found during sample analysis. Each object remains in the Suspicious Objects tab for 30 days. 5-16 Virtual Analyzer Note The C&C server list obtained by other products from Virtual Analyzer is a subset of the suspicious objects list. Products use the C&C list to detect C&C callback events. The following columns show information about objects added to the suspicious objects list: TABLE 5-4. Suspicious Objects Columns COLUMN NAME INFORMATION Last Found Date and time Virtual Analyzer last found the object in a submitted sample Expiration Date and time Virtual Analyzer will remove the object from the Suspicious Objects tab Risk Level If the suspicious object is: • IP address or domain: The risk rating that typically shows is either High or Medium (see risk rating descriptions below). This means that high- and medium-risk IP addresses/ domains are treated as suspicious objects. Note An IP address or domain with the Low risk rating is also displayed if it is associated with other potentially malicious activities, such as accessing suspicious host domains. • URL: The risk rating that shows is High, Medium, or Low. • SHA-1 value: The risk rating that shows is always High. Risk rating descriptions: • High: Known malicious or involved in high-risk connections • Medium: IP address/domain/URL is unknown to reputation service • Low: Reputation service indicates previous compromise or spam involvement 5-17 Deep Discovery Analyzer 5.0 Administrator's Guide COLUMN NAME INFORMATION Type IP address, domain, URL, or SHA-1 Object The IP address, domain, URL, or SHA-1 value Latest Related Sample SHA-1 value of the sample where the object was last found All Related Samples The total number of samples where the object was found Clicking the SHA-1 value opens the Submissions screen, with the SHA-1 value as the search criteria. Clicking the number shows a pop-up window. In the pop-up window, click the SHA-1 value to open the Submissions screen with the SHA-1 value as the search criteria. Suspicious Objects Tasks The following table lists all the Suspicious Objects tab tasks: TABLE 5-5. Suspicious Objects Tasks TASK Export/Export All STEPS Select one or several objects and then click Export to save the objects to a CSV file. Click Export All to save all the objects to a CSV file. 5-18 Add to Exceptions Select one or several objects that you consider harmless and then click Add to Exceptions. The objects move to the Exceptions tab. Never Expire Select one or several objects that you always want flagged as suspicious and then click Never Expire. Expire Now Select one or several objects that you want removed from the Suspicious Objects tab and then click Expire Now. When the same object is detected in the future, it will be added back to the Suspicious Objects tab. Virtual Analyzer TASK Data Filters Records and Pagination Controls STEPS If there are too many entries in the table, limit the entries by performing these tasks: • Select an object type in the Show dropdown box. • Select a column name in the Search column dropdown box and then type some characters in the Search keyword text box next to it. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches only the selected column in the table for matches. The panel at the bottom of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view. Exceptions Objects in the exceptions list are automatically considered safe and are not added to the suspicious objects list. Manually add trustworthy objects or go to the Virtual Analyzer Suspicious Objects screen and select suspicious objects that you consider harmless. The following columns show information about objects in the exception list. 5-19 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 5-6. Exceptions Columns COLUMN NAME INFORMATION Added Date and time Virtual Analyzer added the object to the Exceptions tab Type IP address, domain, URL, or SHA-1 Suspicious Object The IP address, domain, URL, or SHA-1 value Notes Notes for the object Click the link to edit the notes. Exceptions Tasks The following table lists all the Suspicious Objects tab tasks: 5-20 Virtual Analyzer TABLE 5-7. Suspicious Objects Tasks TASK Add STEPS Click Add to add an object. In the new window that opens, configure the following: • Type: Select an object type and then type the object (IP address, domain, URL or SHA-1) in the next field. • Notes: Type some notes for the object • Add More: Click this button to add more objects. Select an object type, type the object in next field, type some notes, and then click Add to List Below. Click Add when you have defined all the objects that you wish to add. Import Click Import to add objects from a properly-formatted CSV file. In the new window that opens: • If you are importing exceptions for the first time, click Download sample CSV, save and populate the CSV file with objects (see the instructions in the CSV file), click Browse, and then locate the CSV file. • If you have imported exceptions previously, save another copy of the CSV file, populate it with new objects, click Browse, and then locate the CSV file. 5-21 Deep Discovery Analyzer 5.0 Administrator's Guide TASK Delete/Delete All STEPS Select one or several objects to remove and then click Delete. Click Delete All to delete all objects. Export/Export All Select one or several objects and then click Export to save the objects to a CSV file. Click Export All to save all the objects to a CSV file. Data Filters Records and Pagination Controls If there are too many entries in the table, limit the entries by performing these tasks: • Select an object type in the Show dropdown box. • Select a column name in the Search column dropdown box and then type some characters in the Search keyword text box next to it. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches only the selected column in the table for matches. The panel at the bottom of the screen shows the total number of objects. If all objects cannot be displayed at the same time, use the pagination controls to view the objects that are hidden from view. Sandbox Management The Sandbox Management screen includes the following: • Status Tab on page 5-23 • Network Connections Tab on page 5-25 • Images Tab on page 5-27 • Archive Passwords Tab on page 5-32 5-22 Virtual Analyzer Note If Virtual Analyzer does not contain images, clicking Sandbox Management displays the Import Image screen. Status Tab The Status tab displays the following information: • Overall status of Virtual Analyzer, including the number of samples queued and currently processing Virtual Analyzer displays the following: TABLE 5-8. Virtual Analyzer Statuses STATUS DESCRIPTION Initializing... Virtual Analyzer is preparing the analysis environment. Starting... Virtual Analyzer is starting all sandbox instances. Stopping... Virtual Analyzer is stopping all sandbox instances. Running Virtual Analyzer is analyzing samples. No images No images have been imported into Virtual Analyzer. 5-23 Deep Discovery Analyzer 5.0 Administrator's Guide STATUS • DESCRIPTION No active images None of the imported images are currently active.Virtual Analyzer is not analyzing samples. Disabled Virtual Analyzer is temporarily unavailable. Modifying instances… Virtual Analyzer is increasing or decreasing the number of instances for one or more images. Importing images… Virtual Analyzer is importing one or more images. Removing images… Virtual Analyzer is removing one or more images. Unrecoverable error Virtual Analyzer is unable to recover from an error. Contact your support provider for troubleshooting assistance. Status of imported images TABLE 5-9. Image Information STATUS 5-24 DESCRIPTION Image Permanent image name Instances Number of deployed sandbox instances Current Status Distribution of idle and busy sandbox instances Utilization Overall utilization (expressed as a percentage) based on the number of sandbox instances currently processing samples Virtual Analyzer Network Connection Tab Use the Network Connection tab to specify how sandbox instances connect to external destinations. External connections are disabled by default. Trend Micro recommends enabling external connections using an environment isolated from the management network. The environment can be a test network with Internet connection but without proxy settings, proxy authentication, and connection restrictions. When external connections are enabled, any malicious activity involving the Internet and remote hosts actually occurs during sample processing. Enabling External Connections Sample analysis is paused and settings are disabled whenever Virtual Analyzer is being configured. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Network Connection. The Network Connection screen appears. 5-25 Deep Discovery Analyzer 5.0 Administrator's Guide 2. Select Enable external connections. The settings panel appears. 3. Select the type of connection to be used by sandbox instances. • Custom: Any user-defined network Important Trend Micro recommends using an environment isolated from the management network, such as a test network with Internet connection but without proxy settings, proxy authentication, and connection restrictions. • Management network: Default organization Intranet WARNING! Enabling connections to the management network may result in malware propagation and other malicious activity in the network. 4. 5-26 If you selected Custom, specify the following: • Network adapter: Select an adapter with a linked state. • IP address: Type an IPv4 address. • Subnet mask • Gateway • DNS Virtual Analyzer 5. Click Save. Images Tab Virtual Analyzer does not contain any images when enabled. The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Virtual Analyzer supports the following image types: • Default: Deep Discovery Analyzer provides two default images that are stored in a USB device. Attach the USB device to the Deep Discovery Analyzer appliance before navigating to the Import Image screen. • Custom: Deep Discovery Analyzer supports Open Virtual Appliance (OVA) files. For more information, see Sandbox Image Files on page 5-27. Note Before importing custom images, verify that you have secured valid licenses for all included platforms and applications. Sandbox Image Files Open Virtualization Format (OVF) is a cross-platform standard for packaging and distributing software to be run in virtual machines. OVF enables the creation of readyto-use software packages (operating systems with applications) that require no configuration or installation. 5-27 Deep Discovery Analyzer 5.0 Administrator's Guide An OVF package consists of several files placed in one directory. The files include the following: • One OVF descriptor: An XML file that contains all of the metadata about the OVF package and its contents • One or more disk images • Optional: Certificate files • Optional: Other auxiliary files The above files can be packed into a single archive file with the extension .ova. Virtual Analyzer supports only image files in the OVA format. For more information, see Creating a Custom Virtual Analyzer Image on page A-2. Importing an Image The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Virtual Analyzer supports OVA files between 1GB and 10GB in size. For information about creating a new image file, see Creating a Custom Virtual Analyzer Image on page A-2. Important Virtual Analyzer stops analysis and keeps all samples in the queue whenever an image is added or deleted, or when instances are modified. All instances are also automatically redistributed whenever you add images. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Images. The Images screen appears. 5-28 Virtual Analyzer 2. Click Import. The Import Image screen appears. 3. Select an image source and configure the applicable settings. Option Procedure HTTP or FTP server a. Type a permanent image name with a maximum of 50 characters. b. Type the URL of the OVA file. c. Optional: Type logon credentials if authentication is required. a. Insert the USB device containing the default images to the Deep Discovery Analyzer appliance. Default image Important Do not remove the USB device during the import process. b. 4. Select an image. Click Import. Virtual Analyzer validates the OVA files before starting the import process. 5-29 Deep Discovery Analyzer 5.0 Administrator's Guide Note If you selected HTTP or FTP server, Deep Discovery Analyzer downloads the images first before importing into Virtual Analyzer. The process can only be cancelled before the download completes. Modifying Sandbox Instances The hardware specifications of your Deep Discovery Analyzer appliance determine the number of images that you can import and the number of instances that you can deploy per image. The standard Deep Discovery Analyzer appliance supports a maximum of three images and 33 instances. Important Virtual Analyzer stops all analysis and keeps all samples in the queue whenever an image is added or deleted, or when instances are modified. All instances are also automatically redistributed whenever you add images. Procedure 1. Go to Virtual Analyzer > Sandbox Management > Images. The Images screen appears. 2. 5-30 Click Modify. Virtual Analyzer The Modify Sandbox Instances screen appears. 3. Modify the instances allocated to any image. 4. Click Configure. Virtual Analyzer displays a confirmation message. 5. Click OK. Virtual Analyzer configures the sandbox instances. Please wait for the process to finish before navigating away from the screen. Note If configuration is unsuccessful, Virtual Analyzer reverts to the previous settings and displays an error message. 5-31 Deep Discovery Analyzer 5.0 Administrator's Guide Archive File Passwords Always handle potentially malicious files with caution. Trend Micro recommends adding such files to a password-protected archive file before transporting the files across the network. Deep Discovery Analyzer can also heuristically discover passwords in email messages to extract files. Virtual Analyzer uses user-specified passwords to extract files. For better performance, list commonly used passwords first. Virtual Analyzer supports the following archive file types: • bzip • rar • tar • zip If Virtual Analyzer is unable to extract files using any of the listed passwords, Deep Discovery Analyzer displays the error Unsupported file type and removes the archive file from the queue. Note Archive file passwords are stored as unencrypted text. Adding Archive File Passwords Deep Discovery Analyzer supports a maximum of 10 passwords. Procedure 1. 5-32 Go to Virtual Analyzer > Sandbox Management > Archive Passwords. Virtual Analyzer The Archive Passwords screen appears. 2. Type a password with only ASCII characters. Note Passwords are case-sensitive and must not contain spaces. 3. Optional: Click Add password and type another password. 4. Optional: Drag and drop the password to move it up or down the list. 5. Optional: Delete a password by clicking the x icon beside the corresponding text box. 6. Click Save. 5-33 Chapter 6 Reports This chapter describes the features of the Reports. 6-1 Deep Discovery Analyzer 5.0 Administrator's Guide Reports All reports generated by Deep Discovery Analyzer are based on an operational report template. Generated Reports The Generated Reports screen, in Reports > Generated Reports, shows all reports generated by Deep Discovery Analyzer. In addition to being displayed as links on the management console, generated reports are also available as attachments to an email. Before generating a report, you are given the option to send it to one or several email recipients. Report Tasks The Generated Reports screen includes the following options: TABLE 6-1. Generated Reports Tasks TASK 6-2 STEPS Generate Reports See Generating Reports on page 6-3. Download Report To download a report, go to the last column in the table and click the icon. Generated reports are available as PDF files. Send Report Select a report and then click Send Report. You can send only one report at a time. Delete Select one or more reports and then click Delete. Sort Column Data Click a column title to sort the data below it. Records and Pagination Controls The panel at the bottom of the screen shows the total number of reports. If all reports cannot be displayed at the same time, use the pagination controls to view the reports that are hidden from view. Reports Generating Reports Procedure 1. Go to Reports > Generated Reports. The Generated Reports screen appears. 2. Click Generate New. The Generate Report window appears. 3. Configure report settings. Option Description Template Select an operational report template. Description Type a description that does not exceed 500 characters. Range Specify the covered date(s) based on the selected report template. 6-3 Deep Discovery Analyzer 5.0 Administrator's Guide Option Recipients Description • Daily operational report: Select any day prior to the current day. The report coverage is from 00:00:00 to 23:59:59 of each day. • Weekly operational report: Select the day of the week on which the report coverage ends. For example, if you choose Wednesday, the report coverage is from Wednesday of a particular week at 23:59:59 until Tuesday of the preceding week at 00:00:00. • Monthly operational report: Select the day of the month on which the report coverage ends. For example, if you choose the 10th day of a month, the report coverage is from the 10th day of a particular month at 23:59:59 until the 9th day of the preceding month at 00:00:00. You can type a maximum of 100 email addresses, typing them one a time. Note You must press Enter after each email address. Do not type multiple email addresses separated by commas. Before specifying recipients, configure the SMTP settings in Administration > System Settings > SMTP Settings. Note Deep Discovery Analyzer generates reports approximately five minutes after Send is clicked. 4. 6-4 Click Generate. Reports Report Settings Schedules Tab The Report Schedules tab, in Reports > Report Settings, shows all the report schedules created from report templates. Each schedule containsi settings for reports, including the template that will be used and the actual schedule. Note This screen does not contain any generated reports. To view the reports, navigate to Reports > Generated Reports. This tab includes the following options: TABLE 6-2. Schedules Tasks TASK STEPS Add schedule Click Add schedule to add a new report schedule. This opens the Add Report Schedule window, where you specify settings for the report schedule. For more information, see Add Report Schedule Window on page 6-6. Edit Select a report schedule and then click Edit to edit its settings. This opens the Edit Report Schedule window, which contains the same settings in the Add Report Schedule window. For more information, see Add Report Schedule Window on page 6-6. Only one report schedule can be edited at a time. Delete Select one or several report schedules to delete and then click Delete. 6-5 Deep Discovery Analyzer 5.0 Administrator's Guide TASK STEPS Sort Column Data Click a column title to sort the data below it. Records and Pagination Controls The panel at the bottom of the screen shows the total number of report schedules. If all report schedules cannot be displayed at the same time, use the pagination controls to view the schedules that are hidden from view. Add Report Schedule Window The Add Report Schedule window appears when you add a report schedule. A report schedule contains settings that Deep Discovery Analyzer will use when generating scheduled reports. This window includes the following options: TABLE 6-3. Add Report Schedule Window Tasks FIELD 6-6 STEPS Template Choose a template. Description Type a description. Reports FIELD Schedule STEPS Configure the schedule according to the template you chose. If the template is for a daily report, configure the time the report generates. The report coverage is from 00:00:00 to 23:59:59 of each day and the report starts to generate at the time you specified. If the template is for a weekly report, select the start day of the week and configure the time the report generates. For example, if you choose Wednesday, the report coverage is from Wednesday of a particular week at 00:00:00 until Tuesday of the following week at 23:59:59. The report starts to generate on Wednesday of the following week at the time you specified. If the template is for a monthly report, select the start day of the month and configure the time the report generates. For example, if you choose the 10th day of a month, the report coverage is from the 10th day of a particular month at 00:00:00 until the 9th day of the following month at 23:59:59. The report starts to generate on the 10th day of the following month at the time you specified. Note If the report is set to generate on the 29th, 30th, or 31st day of a month and a month does not have this day, Deep Discovery Analyzer starts to generate the report on the first day of the next month at the time you specified. Format The file format of the report is PDF only. Recipients Type a valid email address to which to send reports and then press Enter. You can type up to 100 email addresses, typing them one a time. It is not possible to type multiple email addresses separated by commas. Before specifying recipients, verify that you have specified SMTP settings in Administration > System Settings > SMTP Settings tab. 6-7 Deep Discovery Analyzer 5.0 Administrator's Guide Customization Tab The Reports Customization tab, in Reports > Reports Settings, allows you to customize items in the Deep Discovery Analyzer reports. This screen includes the following options: TABLE 6-4. Header OPTION 6-8 TASK DISPLAY AREA Company name Type a name that does not exceed 40 characters. Report cover Header logo Browse to the location of the logo and click Upload. The dimensions of the logo are specified in the screen. Notification Reports OPTION Bar color TASK To change the default color, click it and then pick the color from the color matrix that displays. DISPLAY AREA Notification TABLE 6-5. Footer OPTION TASKS DISPLAY AREA Footer logo Browse to the location of the logo and click Upload. The dimensions of the logo are specified in the screen. Notification Footer note Type a note. Notification 6-9 Chapter 7 Administration The features of the Administration tab are discussed in this chapter. 7-1 Deep Discovery Analyzer 5.0 Administrator's Guide Updates Use the Updates screen, in Administration > Updates, to check the status of security components and manage update settings. An Activation Code is required to use and update components. For more information, see Licensing on page 7-22. Components The Components tab shows the security components currently in use. COMPONENT 7-2 DESCRIPTION Advanced Threat Scan Engine Virtual Analyzer uses the Advanced Threat Scan Engine to check files for less conventional threats, including document exploits. Some detected files may seem safe but should be further observed and analyzed in a virtual environment. Deep Discovery Malware Pattern The Deep Discovery Malware Pattern contains information that helps Deep Discovery Analyzer identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the pattern several times a week, and any time after the discovery of a particularly damaging virus/malware. IntelliTrap Pattern The IntelliTrap Pattern is used for identifying compressed executable file types that commonly hide malware and other potential threats. Administration COMPONENT DESCRIPTION IntelliTrap Exception Pattern The IntelliTrap Exception Pattern provides a list of compressed executable file types that are commonly safe from malware and other potential threats. Network Content Correlation Pattern Network Content Correlation Pattern implements detection rules defined by Trend Micro. Spyware Activemonitoring Pattern The Spyware Active-monitoring Pattern identifies unique patterns of bits and bytes that signal the presence of certain types of potentially undesirable files and programs, such as adware and spyware, or other grayware. Virtual Analyzer Sensors Virtual Analyzer Sensors is a module on sandboxes used for simulating threats. Update Settings The Update Settings tab allows you to configure automatic updates and the update source. 7-3 Deep Discovery Analyzer 5.0 Administrator's Guide SETTING Automatic updates DESCRIPTION Select Automatically check for updates to keep components up-to-date. If you enable automatic updates, Deep Discovery Analyzer runs an update everyday. Specify the time the update runs. Update source Deep Discovery Analyzer can download components from the Trend Micro ActiveUpdate server or from another source. You may specify another source if Deep Discovery Analyzer is unable to reach the ActiveUpdate server directly. If you choose the ActiveUpdate server, verify that Deep Discovery Analyzer has Internet connection. If you choose another source, set up the appropriate environment and update resources for this update source. Also ensure that there is a functional connection between Deep Discovery Analyzer and this update source. If you need assistance setting up an update source, contact your support provider. The update source must be specified in URL format. Verify that proxy settings are correct if Deep Discovery Analyzer requires a proxy server to connect to its update source. For more information, see Proxy Settings Tab on page 7-9. Product Updates Use the Product Updates screen to apply patches, service packs, and hotfixes to Deep Discovery Analyzer. Trend Micro prepares a readme file for each patch, service pack, or hotfix. Read the accompanying readme file before applying an update for feature information and for special installation instructions. Tip When performing a complete deployment of Deep Discovery Analyzer, confirm that you have the latest official build. If you have the latest build when performing complete deployments, then you can skip the following steps to update Deep Discovery Analyzer, unless you have other updates or hotfixes from Trend Micro. 7-4 Administration Perform the following steps to deploy the update. Procedure 1. Receive the product update file from Trend Micro. • If the product update is an official patch or service pack, download it from the download center. http://downloadcenter.trendmicro.com/ • If the product update is a hotfix, request the file from Trend Micro support. 2. On the logon page of the management console, select Extended and then log on using a valid user name and password. 3. Go to Administration > Updates and click the Product Updates tab. 4. Click Browse and select the product update file. 7-5 Deep Discovery Analyzer 5.0 Administrator's Guide 5. Click Apply. Important Do not close or refresh the browser, open another page, perform tasks on the management console, or shut down the computer until updating is complete. The Product Updates tab must remain open during update deployment. System Settings The System Settings screen, in Administration > System Settings, includes the following tabs: 7-6 • Host Name and IP Address Tab on page 7-7 • Proxy Settings Tab on page 7-9 • SMTP Settings Tab on page 7-10 • Date and Time Tab on page 7-11 • Password Policy Tab on page 7-13 • Session Timeout Tab on page 7-14 • Power Off / Restart Tab on page 7-14 Administration Host Name and IP Address Tab Use this screen to configure the host name and IP address of the Deep Discovery Analyzer appliance, and other required network addresses. The default IP address is 192.168.252.2. Modify the IP address immediately after completing all deployment tasks. Note You can also use the Preconfiguration Console to modify the IP address. For more information, see Configuring Network Addresses on the Preconfiguration Console on page 3-4. Deep Discovery Analyzer uses the specified IP address to connect to the Internet when accessing Trend Micro hosted services, including the Smart Protection Network, the ActiveUpdate server, and Threat Connect. The IP address also determines the URL used to access the management console. Procedure 1. Go to Administration > System Settings > Host Name and IP Address. 2. Specify the following: 7-7 Deep Discovery Analyzer 5.0 Administrator's Guide Item Guidelines Host name Character limits: IP address • Number: 63 • Type: Alphanumeric (A to Z; a to z; 0 to 9); hyphen "-" • Other: Must not start with a hyphen Must not conflict with the following addresses: • Sandbox network: Configured in Virtual Analyzer > Sandbox Management > Network Connection • Virtual Analyzer: 1.1.0.0 - 1.1.2.255 • Broadcast: 255.255.255.255 • Multicast: 224.0.0.0 - 239.255.255.255 • Link local: 169.254.1.0 - 169.254.254.255 • Class E: 240.0.0.0 - 255.255.255.255 • Localhost: 127.0.0.1/8 Note Changing the IP address changes the management console URL. Subnet mask 3. 7-8 Must not be any of the following addresses: • 000.000.000.000 • 111.111.111.111 Gateway Must be in the same subnet as the IP address DNS 1 Same as IP address DNS 2 (Optional) Same as IP address Click Save. Administration A system configuration message appears. Click the provided link to return to the management console. Proxy Settings Tab Specify proxy settings if Deep Discovery Analyzer connects to the Internet or management network through a proxy server. Configure the following settings. TABLE 7-1. Proxy Settings Tasks TASK STEPS Use an HTTP proxy server Select this option to enable proxy settings. Server name or IP address Type the proxy server host name or IP address. Port Type the port number that Deep Discovery Analyzer will use to connect to the proxy server. The management console does not support host names with double-byte encoded characters. If the host name includes such characters, type its IP address instead. 7-9 Deep Discovery Analyzer 5.0 Administrator's Guide TASK STEPS Proxy server requires authentication Select this option if connection to the proxy server requires authentication. User name Type the user name used for authentication. Note This option is only available if Proxy server requires authentication is enabled. Password Type the password used for authentication. Note This option is only available if Proxy server requires authentication is enabled. SMTP Settings Tab Deep Discovery Analyzer uses SMTP settings when sending notifications through email. Configure the following settings. 7-10 Administration TABLE 7-2. SMTP Settings Tasks TASK STEPS SMTP Server host name or IP address Type the SMTP server host name or IP address. Sender email address Type the email address of the sender. SMTP server requires authentication Select this option if connection to the SMTP server requires authentication. User name Type the user name used for authentication. The management console does not support host names with double-byte encoded characters. If the host name includes such characters, type its IP address instead. Note This option is only available if SMTP server requires authentication is enabled. Password Type the password used for authentication. Note This option is only available if SMTP server requires authentication is enabled. Date and Time Tab Configure date and time settings immediately after installation. Procedure 1. Go to Administration > System Settings > Date and Time. 7-11 Deep Discovery Analyzer 5.0 Administrator's Guide The Date and Time screen appears. 2. Click Set Date and Time. The settings panel appears. 3. Select one of the following methods and configure the applicable settings. • Connect to NTP server • Set time manually 4. Click Save. 5. Click Set time zone. The settings panel appears. 6. 7-12 Select the applicable time zone. Administration Note Daylight Saving Time (DST) is used when applicable. 7. Click Save. Password Policy Tab Trend Micro recommends requiring strong passwords. Strong passwords usually contain a combination of both uppercase and lowercase letters, numbers, and symbols, and are at least eight characters in length. When strong passwords are required, a user submits a new password, and the password policy determines whether the password meets your company's established requirements. Strict password policies sometimes increase costs to an organization when they force users to select passwords too difficult to remember. Users call the help desk when they forget their passwords, or record passwords and increase their vulnerability to threats. When establishing a password policy balance your need for strong security against the need to make the policy easy for users to follow. 7-13 Deep Discovery Analyzer 5.0 Administrator's Guide Session Timeout Tab Choose default or extended session timeout. A longer session length might be less secure if users forget to log out from the session and leave the console unattended. The default session timeout is 10 minutes and the extended session timeout is one day. You can change these values according to your preference. New values take effect on the next logon. Power Off / Restart Tab You can power off or restart the Deep Discovery Analyzer appliance on the management console. • Power Off: All active tasks are stopped, and then the appliance gracefully shuts down. • Restart: All active tasks are stopped, and then the appliance is restarted. Powering off or restarting the appliance affects the following: • Virtual Analyzer sample analysis: Integrated products may queue samples or bypass submission while the appliance is unavailable. • Active configuration tasks initiated by all users: Trend Micro recommends verifying that all active tasks are completed before proceeding. 7-14 Administration Log Settings Use the Log Settings screen, in Administration > Log Settings, to maintain, delete, or archive logs. You can also forward all logs to a syslog server. Configuring Syslog Settings Deep Discovery Analyzer can forward logs to a syslog server after saving the logs to its database. Only logs saved after enabling this setting will be forwarded. Previous logs are excluded. Procedure 1. Go to Administration > Log Settings. The Log Settings screen appears. 2. Select Forward logs to a syslog server. 7-15 Deep Discovery Analyzer 5.0 Administrator's Guide 3. 4. Select the format in which event logs should be sent to the syslog server. • CEF: Common Event Format (CEF) is an open log management standard developed by HP ArcSight. CEF comprises a standard prefix and a variable extension that is formatted as key-value pairs. • LEEF: Log Event Extended Format (LEEF) is a customized event format for IBM Security QRadar. LEEF comprises an LEEF header, event attributes, and an optional syslog header. Select the protocol to be used when transporting log content to the syslog server. • TCP • UDP 5. Type the host name or IP address of the syslog server. 6. Type the port number. Note Trend Micro recommends using the following default syslog ports: 7. • UDP: 514 • TCP: 601 Click Save. Account Management Use the Account Management screen, in Administration > Account Management, to create and manage user accounts. Users can use these accounts, instead of the default administrator account, to access the management console. Some settings are shared by all user accounts, while others are specific to each account. 7-16 Administration This screen includes the following options. TABLE 7-3. Account Management Tasks TASK STEPS Add Click Add to add a new user account. This opens the Add Account window, where you specify settings for the account. For more information, see Add User Window on page 7-18. Edit Select a user account and then click Edit to edit its settings. This opens the Edit Account window, which contains the same settings as the Add Account window. For more information, see Add User Window on page 7-18. Only one user account can be edited at a time. Delete Select a user account to delete and then click Delete. Only one user account can be deleted at a time. Unlock Deep Discovery Analyzer includes a security feature that locks an account in case the user typed an incorrect password five times in a row. This feature cannot be disabled. Accounts locked this way, including administrator accounts, unlock automatically after ten minutes. The administrator can manually unlock accounts that have been locked. Only one user account can be unlocked at a time. Sort Column Data Click a column title to sort the data below it. Search If there are many entries in the table, type some characters in the Search text box to narrow down the entries. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches all cells in the table for matches. Records and Pagination Controls The panel at the bottom of the screen shows the total number of user accounts. If all user accounts cannot be displayed at the same time, use the pagination controls to view the accounts that are hidden from view. 7-17 Deep Discovery Analyzer 5.0 Administrator's Guide Add User Window The Add User window appears when you add a user account from the Account Management screen. This window includes the following options. 7-18 Administration TABLE 7-4. Add User Window FIELD User Name and Password DETAILS Type an account name that does not exceed 40 characters. Type a password with at least six characters and then confirm it. If you want to use a stricter password, configure the global password policy in Administration > System Settings > Password Policy tab. The password policy will be displayed in the window and must be satisfied before you can add a user account. When a user exceeds the number of retries allowed while entering incorrect passwords, Deep Discovery Analyzer sets the user account to inactive (locked out). You can unlock the account in the Account Management screen. Tip Record the user name and password for future reference. You can print the checklist in Logon Credentials on page 2-6 and record the user names and password in the printed copy. Name Type the name of the account owner. Email Address Type the account owner’s email address. Description (Optional) Type a description that does not exceed 40 characters. Contact Management Use the Contact Management screen, in Administration > Contact Management, to maintain a list of contacts who are interested in the data that your logs collect. 7-19 Deep Discovery Analyzer 5.0 Administrator's Guide This screen includes the following options. TABLE 7-5. Contact Management Tasks TASK STEPS Add Contact Click Add Contact to add a new account. This opens the Add Contact window, where you specify contact details. For more information, see Add Contact Window on page 7-20. Edit Select a contact and then click Edit to edit contact details. This opens the Edit Contact window, which contains the same settings as the Add Contact window. For more information, see Add Contact Window on page 7-20. Only one contact can be edited at a time. Delete Select a contact to delete and then click Delete. Only one contact can be deleted at a time. Sort Column Data Click a column title to sort the data below it. Search If there are many entries in the table, type some characters in the Search text box to narrow down the entries. As you type, the entries that match the characters you typed are displayed. Deep Discovery Analyzer searches all cells in the table for matches. Records and Pagination Controls The panel at the bottom of the screen shows the total number of contacts. If all contacts cannot be displayed at the same time, use the pagination controls to view the contacts that are hidden from view. Add Contact Window The Add Contact window appears when you add a contact from the Contact Management screen. 7-20 Administration This window includes the following options. TABLE 7-6. Add Contact Window FIELD DETAILS Name Type the contact name. Email Address Type the contact’s email address. Phone (Optional) Type the contact’s phone number. Description (Optional) Type a description that does not exceed 40 characters. Tools Use the Tools screen, in Administration > Tools, to view and download special tools for Deep Discovery Analyzer. Each tool displayed on this screen has the following two options: 7-21 Deep Discovery Analyzer 5.0 Administrator's Guide • Usage Instructions: This links to a relevant page in the online help with instructions about how to use the tool. • Download: This links the relevant page in the download center that has the tool. Manual Submission Tool The Manual Submission Tool can be used along with Deep Discovery Analyzer to remotely submit samples from locations on users' computers to Virtual Analyzer. This feature allows users to submit multiple samples at once, which will be added to the Virtual Analyzer Submissions queue. Refer to Manually Submitting Samples on page 5-14 for more information about using the Manual Submission Tool. Licensing Use the Licensing screen, in Administration > Licensing, to view, activate, and renew the Deep Discovery Analyzer license. 7-22 Administration The Deep Discovery Analyzer license includes product updates (including ActiveUpdate) and basic technical support (“Maintenance”) for one (1) year from the date of purchase. In addition, the license allows you to upload threat samples for analysis, and to access Trend Micro Threat Connect from Virtual Analyzer. After the first year, Maintenance must be renewed on an annual basis at the current Trend Micro rate. A Maintenance Agreement is a contract between your organization and Trend Micro. It establishes your right to receive technical support and product updates in return for the payment of applicable fees. When you purchase a Trend Micro product, the License Agreement you receive with the product describes the terms of the Maintenance Agreement for that product. The Maintenance Agreement has an expiration date. Your License Agreement does not. If the Maintenance Agreement expires, you will no longer be entitled to receive technical support from Trend Micro or access Trend Micro Threat Connect. Typically, 90 days before the Maintenance Agreement expires, you will start to receive email notifications, alerting you of the pending discontinuation. You can update your Maintenance Agreement by purchasing renewal maintenance from your Reseller, Trend Micro sales, or on the Trend Micro Customer Licensing Portal at: https://clp.trendmicro.com/fullregistration The Licensing screen includes the following information and options. TABLE 7-7. Product Details FIELD DETAILS Full product name Displays the full name of the product. Build number Displays the full patch and build number for the product. License agreement Displays a link to the Trend Micro License Agreement. Click the link to view or print the license agreement. 7-23 Deep Discovery Analyzer 5.0 Administrator's Guide TABLE 7-8. License Details FIELD Activation Code DETAILS View the Activation Code in this section. If your license has expired, obtain a new Activation Code from Trend Micro. To renew the license, click Specify New Code, and type the new Activation Code. The Licensing screen reappears displaying the number of days left before the product expires. Status Displays either Activated, Not Activated, Evaluation, or Expired. Click View details online to view detailed license information from the Trend Micro website. If the status changes (for example, after you renewed the license) but the correct status is not indicated in the screen, click Refresh. Type 7-24 • Deep Discovery Analyzer: Provides access to all product features • Deep Discovery Analyzer (Trial): Provides access to all product features Expiration date View the expiration date of the license. Renew the license before it expires. Grace period View the duration of the grace period. The grace period varies by region (for example, North America, Japan, Asia Pacific, and so on). Contact your support provider for more information about the grace period for your license. Administration About Deep Discovery Analyzer Use the About Deep Discovery Analyzer screen in Administration > About Deep Discovery Analyzer to view the product version, API key, and other product details. Note The API key is used by Trend Micro products to register and send samples to Deep Discovery Analyzer. For a list of products and supported versions, see Integration with Trend Micro Products and Services on page 3-10. 7-25 Chapter 8 Technical Support Topics include: • Troubleshooting Resources on page 8-2 • Contacting Trend Micro on page 8-3 • Sending Suspicious Content to Trend Micro on page 8-5 • Other Resources on page 8-5 8-1 Deep Discovery Analyzer 5.0 Administrator's Guide Troubleshooting Resources Before contacting technical support, consider visiting the following Trend Microonline resources. Trend Community To get help, share experiences, ask questions, and discuss security concerns with other users, enthusiasts, and security experts, go to: http://community.trendmicro.com/ Using the Support Portal The Trend MicroSupport Portal is a 24x7 online resource that contains the most up-todate information about both common and unusual problems. Procedure 1. Go to http://esupport.trendmicro.com. 2. Select a product or service from the appropriate drop-down list and specify any other related information. The Technical Support product page appears. 3. Use the Search Support box to search for available solutions. 4. If no solution is found, click Submit a Support Case from the left navigation and add any relevant details, or submit a support case here: http://esupport.trendmicro.com/srf/SRFMain.aspx A Trend Micro support engineer investigates the case and responds in 24 hours or less. 8-2 Technical Support Security Intelligence Community Trend Microcybersecurity experts are an elite security intelligence team specializing in threat detection and analysis, cloud and virtualization security, and data encryption. Go to http://www.trendmicro.com/us/security-intelligence/index.html to learn about: • Trend Microblogs, Twitter, Facebook, YouTube, and other social media • Threat reports, research papers, and spotlight articles • Solutions, podcasts, and newsletters from global security insiders • Free tools, apps, and widgets. Threat Encyclopedia Most malware today consists of "blended threats" - two or more technologies combined to bypass computer security protocols. Trend Microcombats this complex malware with products that create a custom defense strategy. The Threat Encyclopedia provides a comprehensive list of names and symptoms for various blended threats, including known malware, spam, malicious URLs, and known vulnerabilities. Go to http://about-threats.trendmicro.com/ to learn more about: • Malware and malicious mobile code currently active or "in the wild" • Correlated threat information pages to form a complete web attack story • Internet threat advisories about targeted attacks and security threats • Web attack and online trend information • Weekly malware reports. Contacting Trend Micro In the United States, Trend Microrepresentatives are available by phone, fax, or email: 8-3 Deep Discovery Analyzer 5.0 Administrator's Guide Address Trend Micro, Inc. 10101 North De Anza Blvd., Cupertino, CA 95014 Phone Toll free: +1 (800) 228-5651 (sales) Voice: +1 (408) 257-1500 (main) • Fax +1 (408) 257-2003 Website http://www.trendmicro.com Email address support@trendmicro.com Worldwide support offices: http://www.trendmicro.com/us/about-us/contact/index.html • Trend Microproduct documentation: http://docs.trendmicro.com Speeding Up the Support Call To improve problem resolution, have the following information available: 8-4 • Steps to reproduce the problem • Appliance or network information • Computer brand, model, and any additional hardware connected to the endpoint • Amount of memory and free hard disk space • Operating system and service pack version • Endpoint client version • Serial number or activation code • Detailed description of install environment • Exact text of any error message received. Technical Support Sending Suspicious Content to Trend Micro Several options are available for sending suspicious content to Trend Microfor further analysis. File Reputation Services Gather system information and submit suspicious file content to Trend Micro: http://esupport.trendmicro.com/solution/en-us/1059565.aspx Record the case number for tracking purposes. Email Reputation Services Query the reputation of a specific IP address and nominate a message transfer agent for inclusion in the global approved list: https://ers.trendmicro.com/ Web Reputation Services Query the safety rating and content type of a URL suspected of being a phishing site, or other so-called "disease vector" (the intentional source of Internet threats such as spyware and malware): http://global.sitesafety.trendmicro.com/ If the assigned rating is incorrect, send a re-classification request to Trend Micro. Other Resources In addition to solutions and support, there are many other helpful resources available online to stay up to date, learn about innovations, and be aware of the latest security trends. 8-5 Deep Discovery Analyzer 5.0 Administrator's Guide TrendEdge Find information about unsupported, innovative techniques, tools, and best practices for Trend Micro products and services. The TrendEdge database contains numerous documents covering a wide range of topics for Trend Micropartners, employees, and other interested parties. See the latest information added to TrendEdge at: http://trendedge.trendmicro.com/ Download Center From time to time, Trend Micromay release a patch for a reported known issue or an upgrade that applies to a specific product or service. To find out whether any patches are available, go to: http://www.trendmicro.com/download/ If a patch has not been applied (patches are dated), open the Readme file to determine whether it is relevant to your environment. The Readme file also contains installation instructions. TrendLabs TrendLabs℠ is a global network of research, development, and action centers committed to 24x7 threat surveillance, attack prevention, and timely and seamless solutions delivery. Serving as the backbone of the Trend Microservice infrastructure, TrendLabs is staffed by a team of several hundred engineers and certified support personnel that provide a wide range of product and technical support services. TrendLabs monitors the worldwide threat landscape to deliver effective security measures designed to detect, preempt, and eliminate attacks. The daily culmination of these efforts is shared with customers through frequent virus pattern file updates and scan engine refinements. Learn more about TrendLabs at: 8-6 Technical Support http://cloudsecurity.trendmicro.com/us/technology-innovation/experts/ index.html#trendlabs 8-7 Appendix A Additional Resources This appendix provides additional resources for this product. A-1 Deep Discovery Analyzer 5.0 Administrator's Guide Creating a Custom Virtual Analyzer Image This appendix explains how to create a custom Virtual Analyzer image using VirtualBox and how to import the image into Deep Discovery Analyzer. Downloading and Installing VirtualBox Virtual Box is a cross-platform virtualization application that supports a large number of guest operating systems. Use VirtualBox to create a custom Virtual Analyzer image. Procedure 1. Download the latest version of VirtualBox from: https://www.virtualbox.org/wiki/Downloads A-2 2. Install VirtualBox using English as the default language. 3. If needed, configure language settings after installation by navigating to File > Preferences > Language > English. Additional Resources FIGURE A-1. Language Preferences Window Preparing the Operating System Installer The image must run any of the following operating systems: • Windows XP • Windows 7 Tip Trend Micro recommends using the English version of the listed operating systems. A-3 Deep Discovery Analyzer 5.0 Administrator's Guide Procedure 1. Prepare the operating system installer. 2. Package the installer as an ISO file. 3. Copy the ISO file to the computer on which VirtualBox is installed. Creating a Custom Virtual Analyzer Image Procedure 1. Open VirtualBox. The VirtualBox Manager window opens. FIGURE A-2. VirtualBox Manager 2. A-4 Click New. Additional Resources The Create Virtual Machine window opens. FIGURE A-3. Create Virtual Machine 3. 4. Under Name and operating system, specify the following: Item Instruction Name Type a permanent name for the virtual machine. Type Select Microsoft Windows as the operating system. Version Select Windows XP or Windows 7 as the operating system version. Click Next. A-5 Deep Discovery Analyzer 5.0 Administrator's Guide The Memory size screen appears. FIGURE A-4. Memory Size 5. 6. Specify the amount of memory to be allocated. • Windows XP: 512 MB • Windows 7: 1024 MB Click Next. The Hard drive screen appears. FIGURE A-5. Hard Drive 7. A-6 Select Create a virtual hard drive now and click Create. Additional Resources The Hard drive file type screen appears. FIGURE A-6. Hard Drive File Type Screen 8. 9. Select one of the following: • VDI (VirtualBox Disk Image) • VMDK (Virtual Machine Disk) Click Next. A-7 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage on physical hard drive screen appears. FIGURE A-7. Storage on Physical Hard Drive 10. Select Dynamically allocated and click Next. The File location and size screen appears. FIGURE A-8. File Location and Size 11. Specify the following: • A-8 Name of the new virtual hard drive file Additional Resources • Size of the virtual hard drive • Windows XP: 15 GB • Windows 7: 25 GB 12. Click Create. VirtualBox Manager creates the virtual machine. When the process is completed, the virtual machine appears on the left pane of the Virtual Manager window. FIGURE A-9. VirtualBox Manager 13. Click Settings. A-9 Deep Discovery Analyzer 5.0 Administrator's Guide The Settings window opens. FIGURE A-10. Settings 14. On the left pane, click System. A-10 Additional Resources The System screen appears. FIGURE A-11. System Settings - Motherboard 15. On the Motherboard tab, specify the following: Item Instruction Chipset Select ICH9. Pointing Device Select USB Tablet. Extended Features Select Enable IO APIC. 16. Click the Processor tab. A-11 Deep Discovery Analyzer 5.0 Administrator's Guide The Processor screen appears. FIGURE A-12. System Options - Processor Select Enable PAE/NX. 17. Click the Acceleration tab. A-12 Additional Resources The Acceleration screen appears. FIGURE A-13. System Options - Acceleration 18. For Hardware Virtualization, select Enable VT-x/AMD-V and Enable Nested Paging. 19. On the left pane, click Storage. A-13 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage screen appears. 20. Under Storage Tree, select Controller: IDE. 21. Click the optical disc icon. Under Attributes, verify that CD/DVD Drive is IDE Secondary Master. FIGURE A-14. IDE Secondary Master 22. Click the CD icon next to the CD/DVD Drive dropdown list. A-14 Additional Resources A file menu appears. 23. Select Choose a virtual CD/DVD disk file… and the ISO file containing the operating system installer. The ISO file is available as a device. 24. On the left pane, click Audio. The Audio screen appears. FIGURE A-15. Audio Options Settings Window 25. Deselect Enable Audio. 26. On the left pane, click Shared Folders. A-15 Deep Discovery Analyzer 5.0 Administrator's Guide The Shared Folders screen appears. FIGURE A-16. Shared Folders Settings Window 27. Verify that no shared folders exist, and then click OK. The Settings window closes. 28. On the VirtualBox Manager window, click Start. The installation process starts. 29. Follow the on-screen instructions to complete the installation. Installing the Required Software on the Image • The Virtual Analyzer supports Microsoft Office 2003, 2007, and 2010. After installing Microsoft Office, start all applications before importing the image. On Microsoft Office 2010, enable all macros. A-16 1. On Microsoft Word, Excel, and Powerpoint, go to File > Options > Trust Center. 2. Under Microsoft Trust Center, click Trust Center Settings. Additional Resources • 3. Click Macro Settings. 4. Select Enable all macros. 5. Click OK. The Virtual Analyzer also supports Adobe Acrobat and Adobe Reader. Trend Micro recommends installing the version of Adobe Reader that is widely used in your organization. To download the most current version of Adobe Acrobat reader, go to http:// www.adobe.com/downloads/. If Adobe Reader is currently installed on the host: 1. Disable automatic updates to avoid threat simulation issues. To disable automatic updates, read the instructions on http://helpx.adobe.com/ acrobat/kb/disable-automatic-updates-acrobat-reader.htm. 2. Install the necessary Adobe Reader language packs so that file samples authored in languages other than those supported in your native Adobe Reader can be processed. For example, if you have the English version of Adobe Reader and you expect samples authored in East Asian languages to be processed, install the Asian and Extended Language Pack. 3. Before exporting the image, start Adobe Reader. If you do not install Acrobat Reader, the Virtual Analyzer: • • Automatically installs Adobe Reader 8, 9, and 11 on all images. • Uses all three versions during analysis. This consumes additional computing resources. If the image runs Windows XP, install .NET Framework 3.5 (or later). To download, go to http://www.microsoft.com/en-us/download/details.aspx?id=21. With these software applications, the custom Virtual Analyzer image can provide decent detection rates. As such, there is no need to install additional software applications, including VBoxTool, unless advised by a Trend Micro security expert. A-17 Deep Discovery Analyzer 5.0 Administrator's Guide Modifying the Image Environment Modify the custom Virtual Analyzer image environment to run the Virtual Analyzer Sensors, a module used for simulating threats. Modifying the Image Environment (Windows XP) Procedure 1. Open a command prompt (cmd.exe). 2. View all user accounts by typing: net user 3. Delete non built-in user accounts one at a time by typing: net user “<username>” /delete For example: net user “test” /delete 4. Set the logon password for the “Administrator” user account to “1111” by typing: net user “Administrator” 1111 5. Configure automatic logon. Each time the image starts, the logon prompt is bypassed and the “Administrator” account is automatically used to log on to the system. a. A-18 Type the following commands: • REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d Administrator /f • REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d 1111 /f Additional Resources • b. REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 1 /f Restart the image. A-19 Deep Discovery Analyzer 5.0 Administrator's Guide No logon prompt displayed and the “Administrator” account is automatically used. A-20 Additional Resources Modifying the Image Environment (Windows 7) Procedure 1. Open a command prompt (cmd.exe). 2. Enable the “Administrator” account by typing: net user “Administrator” /active:yes 3. View all user accounts by typing: net user 4. Delete non built-in user accounts one at a time by typing: net user “<username>” /delete For example: net user “test” /delete 5. Set the logon password for the “Administrator” user account to “1111” by typing: net user “Administrator” 1111 6. Go to Control Panel > AutoPlay. A-21 Deep Discovery Analyzer 5.0 Administrator's Guide 7. Select Install or run program from your media for the setting Software and games. 8. Click Save. 9. Configure automatic logon. Each time the image starts, the logon prompt is bypassed and the “Administrator” account is automatically used to log on to the system. a. b. A-22 Type the following commands: • REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultUserName /t REG_SZ /d Administrator /f • REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v DefaultPassword /t REG_SZ /d 1111 /f • REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\Winlogon" /v AutoAdminLogon /t REG_SZ /d 1 /f Restart the image. Additional Resources No logon prompt displayed and the “Administrator” account is automatically used. A-23 Deep Discovery Analyzer 5.0 Administrator's Guide Packaging the Image as an OVA File The image contains many files. These files must be packaged as a single OVA file to avoid issues during importing into Deep Discovery Analyzer. Note Deep Discovery Analyzer supports OVA files that are between 1 GB and 10 GB in size. Procedure 1. Power off the image. 2. Verify that the CD/DVD drive is empty. 3. On the VirtualBox Manager window, go to File > Export Appliance. A-24 Additional Resources The Export Virtual Appliance window opens. FIGURE A-17. Appliance Export Wizard 4. Select the image to be exported and click Next. A-25 Deep Discovery Analyzer 5.0 Administrator's Guide The Storage settings screen appears. FIGURE A-18. Storage Settings Window 5. Specify the file name and path. 6. For Format, select OVF 1.0. Important Deep Discovery Analyzer does not support OVF 2.0. 7. A-26 Click Next. Additional Resources The Appliance settings screen appears. FIGURE A-19. Final Appliance Export Configurations Window 8. Verify the metadata that will be added to the virtual appliance. Important The License field must be blank. Deep Discovery Analyzer does not accept the Software License Agreement when importing the image. 9. Click Export. VirtualBox starts to create the OVA file. A-27 Deep Discovery Analyzer 5.0 Administrator's Guide Importing the OVA File Into Deep Discovery Analyzer Upload the OVA file to an HTTP or FTP server before importing it into Deep Discovery Analyzer. Verify that Deep Discovery Analyzer can connect to this server. For an HTTP server, Deep Discovery Analyzer can connect through secure HTTP. When the OVA file has been uploaded to a server: • Import the OVA file from the Deep Discovery Analyzer web console. For more information, see Importing an Image on page 5-28. • Configure Virtual Analyzer settings. For more information, see Enabling External Connections on page 5-25. Troubleshooting A-28 ISSUE EXPLANATION AND SOLUTION The Found New Hardware Wizard opens with the image on VirtualBox. The hardware wizard automatically runs whenever a VMware image is converted to a VirtualBox image. Create images using VirtualBox to avoid issues when importing images to Virtual Analyzer. The converted VMDK file displays the blue screen “Cannot find Operating System” when powered on through VirtualBox. The chipset ICH9 must be selected and the IP APIC must be enabled. An OVA file is experiencing some problems uploading into Deep Discovery Analyzer. Verify that the OVA file was created from VirtualBox. The OVA file is too large and cannot upload into Deep Discovery Analyzer. The OVA file size should be between 1 GB and 10 GB. Try removing unnecessary programs and software on the image and then package the image again as an OVA file. Additional Resources Categories of Notable Characteristics TABLE A-1. Anti-security, Self-preservation CHARACTERISTICS DESCRIPTION Deletes antivirus registry entry Removal of registry entries associated with security software may prevent these software from running. Disables antivirus service Disabling of services associated with security software may prevent these software from running. Stops or modifies antivirus service Stopping or modification of services associated with security software may prevent these software from running. Uses suspicious packer Malware are often compressed using packers to avoid detection and prevent reverse engineering. Checks for sandbox To avoid being analyzed, some malware uses advanced techniques to determine whether they are running in a virtual environment (sandbox). TABLE A-2. Autostart or Other System Reconfiguration CHARACTERISTICS DESCRIPTION Adds Active Setup value in registry "Values in the Active Setup registry key are used by Windows components. Malware may add such values to automatically run at startup. Adds autorun in registry Addition of autorun registry keys enables malware to automatically run at startup. Adds scheduled task Scheduled tasks are used to automatically run components at predefined schedules. Malware may add such tasks to remain active on affected systems. Adds startup file or folder Windows automatically opens files in the startup folder. Malware may add a file or folder in this location to automatically run at startup and stay running. Modifies firewall settings Malware may add a firewall rule to allow certain types of traffic and to evade firewall protection. A-29 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS DESCRIPTION Modifies AppInit_DLLs in registry Modification of DLLs in the AppInit_DLLs registry value may allow malware to inject its code into another process. Modifies important registry entries Malware may modify important registry entries, such as those used for folder options, browser settings, service configuration, and shell commands. Modifies system file or folder Modification of system files and usage of system folders may allow malware to conceal itself and appear as a legitimate system component. Modifies IP address Malware may modify the IP address of an affected system to allow remote entities to locate that system. Modifies file with infectible type Certain types of files that are located in non-system folders may be modified by malware. These include shortcut links, document files, dynamic link libraries (DLLs), and executable files. TABLE A-3. Deception, Social Engineering CHARACTERISTICS A-30 DESCRIPTION Uses fake or uncommon signature Malware may use an uncommon, fake, or blacklisted file signature. Uses spoofed version information Malware may use spoofed version information, or none at all. Creates message box A fake message box may be displayed to trick users into construing malware as a legitimate program. Uses deceiving extension A deceiving file extension may be used to trick users into construing malware as a legitimate program. Uses double DOS header The presence of two DOS headers is suspicious because it usually occurs when a virus infects an executable file. Uses double extension with executable tail Double file extension names are commonly used to lure users into opening malware. Additional Resources CHARACTERISTICS DESCRIPTION Drops fake system file Files with names that are identical or similar to those of legitimate system files may be dropped by malware to conceal itself. Uses fake icon Icons from known applications or file types are commonly used to lure users into opening malware. Uses file name associated with pornography File names associated with pornography are commonly used to lure users into opening malware. TABLE A-4. File Drop, Download, Sharing, or Replication CHARACTERISTICS DESCRIPTION Creates multiple copies of a file Multiple copies of a file may be created by malware in one or more locations on the system. These copies may use different names in order to lure the user into opening the file. Copies self Malware may create copies of itself in one or more locations on the system. These copies may use different names in order to lure the user into opening the file. Deletes self Malware may delete itself to remove traces of the infection and to prevent forensic analysis. Downloads executable Downloading of executable files is considered suspicious because this behavior is often only attributed to malware and applications that users directly control. Drops driver Many drivers run in kernel mode, allowing them to run with high privileges and gain access to core operating system components. Malware often install drivers to leverage these privileges. Drops executable An executable file may be dropped by malware in one or more locations on the system as part of its installation routine. Drops file into shared folder A file may be dropped by malware in a shared folder as part of its propagation routine, or to enable transmission of stolen data. A-31 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS DESCRIPTION Executes dropped file Execution of a dropped file is considered suspicious because this behavior is often only attributed to malware and certain installers. Shares folder A folder may be shared by malware as part of its propagation routine, or to enable transmission of stolen data. Renames downloaded file Malware may rename a file that it downloaded to conceal the file and to avoid detection. Drops file with infectible type Certain types of files, such as shortcut links and document files, may be dropped by malware. Shortcut links are often used to lure users into opening malware, while document files may contain exploit payload. Deletes file Malware may delete a file to compromise the system, to remove traces of the infection, or to prevent forensic analysis. TABLE A-5. Hijack, Redirection, or Data Theft CHARACTERISTICS A-32 DESCRIPTION Installs keylogger Hooking of user keystrokes may allow malware to record and transmit the data to remote third parties. Installs BHO Browser helper objects (BHO) are loaded automatically each time Internet Explorer is started. BHOs may be manipulated by malware to perform rogue functions, such as redirecting web traffic. Modifies configuration files System configuration files may be modified by malware to perform rogue functions, such as redirecting web traffic or automatically running at startup. Accesses data file Malware may access a data file used to make detection possible (bait file). This behavior is associated with spyware or data theft programs that attempt to access local and network data files. Additional Resources TABLE A-6. Malformed, Defective, or With Known Malware Traits CHARACTERISTICS DESCRIPTION Causes document reader to crash Many document files that contain exploits are malformed or corrupted. Document readers may crash because of a malformed file that contains a poorly implemented exploit. Causes process to crash Malware may crash a process to run shellcode. This may also occur due to poorly constructed code or incompatibility issues. Fails to start Malware may fail to execute because of poor construction. Detected as known malware The file is detected using an aggressive pattern created for a specific malware variant. Detected as probable malware The file is detected using an aggressive generic pattern. Rare executable file This executable file has fewer than ten global detections. It may be a customized application or a file specifically used in targeted attacks. TABLE A-7. Process, Service, or Memory Object Change CHARACTERISTICS DESCRIPTION Adds service Services are often given high privileges and configured to run at startup. Creates mutex Mutex objects are used in coordinating mutually exclusive access to a shared resource. Because a unique name must be assigned to each mutex, the creation of such objects serves as an effective identifier of suspicious content. Creates named pipe Named pipes may be used by malware to enable communication between components and with other malware. Creates process Creation of processes is considered suspicious because this behavior is not commonly exhibited by legitimate applications. Uses heap spray to execute code Malware may perform heap spraying when certain processes are running. Allocation of multiple objects containing exploit code in a heap increases the chances of launching a successful attack. A-33 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS DESCRIPTION Injects memory with dropped files Malware may inject a file into another process. Resides in memory Malware may inject itself into trusted processes to stay in memory and to avoid detection. Executes a copy of itself Malware may execute a copy of itself to stay running. Starts service An existing service may be started by malware to stay running or to gain more privileges. Stops process A process may be stopped by malware to prevent security software and similar applications from running. Contains exploit code in document Documents or SWF files may contain exploits that allow execution of arbitrary code on vulnerable systems. Such exploits are detected using the Trend Micro document exploit detection engine. Attempts to use document exploit A document or SWF file that contains an exploit may pad memory with a sequence of no-operation (NOP) instructions to ensure exploit success. TABLE A-8. Rootkit, Cloaking CHARACTERISTICS A-34 DESCRIPTION Attempts to hide file Malware may attempt to hide a file to avoid detection. Hides file Malware may hide a file to avoid detection. Hides registry Malware may hide a registry key, possibly using drivers, to avoid detection. Hides service Malware may hide a service, possibly using drivers, to avoid detection. Additional Resources TABLE A-9. Suspicious Network or Messaging Activity CHARACTERISTICS DESCRIPTION Creates raw socket Malware may create a raw socket to connect to a remote server. Establishing a connection allows malware to check if the server is running, and then receive commands. Establishes network connection Network connections may allow malware to receive and transmit commands and data. Listens on port Malware may create sockets and listen on ports to receive commands. Opens IRC channel Opening of an Internet Relay Chat (IRC) channel may allow malware to send and receive commands. Queries DNS server Querying of uncommon top-level domains may indicate system intrusion and connections to a malicious server. Establishes uncommon connection Uncommon connections, such as those using non-standard ports, may indicate system intrusion and connections to a malicious server. Sends email Sending of email may indicate a spam bot or mass mailer. Accesses malicious host Hosts that are classified as malicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Accesses malicious URL URLs that are classified as malicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Accesses highly suspicious host Hosts that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Accesses highly suspicious URL URLs that are classified as highly suspicious by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Accesses suspicious host Hosts that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. Accesses suspicious URL URLs that are classified as suspicious or unrated by the Trend Micro Web Reputation Service (WRS) may be accessed by malware. A-35 Deep Discovery Analyzer 5.0 Administrator's Guide CHARACTERISTICS DESCRIPTION Accesses known C&C host Malware accesses known C&Cs to receive commands and transmit data. Exhibits DDOS attack behavior Malware exhibit certain network behavior when participating in a distributed denial of service (DDoS) attack. Exhibits bot behavior Compromised devices exhibit certain network behavior when operating as part of a botnet. Deep Discovery Inspector Rules RULE ID A-36 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 1 Suspicious file extension for an executable file High MALWARE 2 Suspicious file extension for a script file High MALWARE 3 Suspicious file extension for an executable file High MALWARE 4 Suspicious filename for a script file High MALWARE 5 Suspicious filename for an executable file High MALWARE 6 An IRC session on a nonstandard Direct Client to Client port sent an executable file High MALWARE 7 An IRC Bot command was detected High MALWARE 8 A packed executable file was copied to a network administrative shared space High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 9 Highly suspicious archive file detected High MALWARE 10 Medium level suspicious archive file detected Medium MALWARE 11 Highly suspicious archive file detected High MALWARE 12 Highly suspicious archive file detected High MALWARE 13 Highly suspicious archive file detected High MALWARE 14 File security override detected Medium OTHERS 15 Too many failed logon attempts Medium OTHERS 16 Suspicious URL detected in an instant message High MALWARE 17 Remote command shell detected High OTHERS 18 DNS query of a known IRC Command and Control Server High MALWARE 19 Failed host DNS A record query of a distrusted domain mail exchanger Medium OTHERS 20 Malware URL access attempted Medium MALWARE 22 Uniform Resource Identifier leaks internal IP addresses Low SPYWARE 23 The name of the downloaded file matches known malware High MALWARE A-37 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-38 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 24 The name of the downloaded file matches known spyware High SPYWARE 25 Host DNS IAXFR/IXFR request from a distrusted source Low OTHERS 26 IRC session established with a known IRC Command and Control Server High MALWARE 27 Host DNS Mx record query of a distrusted domain Low OTHERS 28 Rogue service detected running on a nonstandard port Medium OTHERS 29 Suspicious email sent Medium OTHERS 30 Message contains a malicious URL High MALWARE 32 Suspicious file extension for an executable file Medium MALWARE 33 IRC session is using a nonstandard port Medium MALWARE 34 Direct Client to Client IRC session sends an executable file Medium MALWARE 35 An executable file was dropped on a network administrative shared space Medium MALWARE 36 Highly suspicious archive file detected High MALWARE 37 File transfer of a packed executable file detected through an Instant Messaging application Medium MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 38 Multiple logon attempt failure Low OTHERS 39 Host DNS query to a distrusted DNS server Medium MALWARE 40 Rogue service detected Medium OTHERS 41 Email message matches a known malware subject and contains packed executable files High MALWARE 43 Email contains a URL with a hard-coded IP address Medium FRAUD 44 Suspicious filename detected Low MALWARE 45 File type does not match the file extension Low MALWARE 46 Suspicious URL detected in an instant message Low MALWARE 47 Suspicious packed executable files detected Medium MALWARE 48 Query of a distrusted domain mail exchanger using the host's DNS A record Low OTHERS 49 IRC protocol detected Low MALWARE 50 Host DNS MX record query of a trusted domain Low OTHERS 51 Email message matches a known malware subject and contains an executable file Low MALWARE 52 Email message sent through a distrusted SMTP server Low MALWARE A-39 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-40 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 54 Email message contains an archive file with packed executable files High MALWARE 55 Suspicious filename detected High MALWARE 56 Malware user-agent detected in an HTTP request High MALWARE 57 Email message sent to a malicious recipient High MALWARE 58 Default account usage Low OTHERS 59 Web request from a malware application Medium MALWARE 60 Highly suspicious Peer-to-Peer activity detected. High OTHERS 61 JPEG Exploit High MALWARE 62 VCalender Exploit High MALWARE 63 Possible buffer overflow attempt detected Low MALWARE 64 Possible NOP sled detected High MALWARE 65 Superscan host enumeration detected Medium OTHERS 66 False HTTP response contenttype header High MALWARE 67 Cross-Site Scripting (XSS) detected Low OTHERS 68 Oracle HTTP Exploit detected High OTHERS 70 Spyware user-agent detected in HTTP request High SPYWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 71 Embedded executable detected in a Microsoft Office file Medium MALWARE 72 Email contains a suspicious link to a possible phishing site. High FRAUD 74 SWF exploit detected High MALWARE 75 ANI exploit detected High MALWARE 76 WMF exploit detected High MALWARE 77 ICO exploit detected High MALWARE 78 PNG exploit detected High MALWARE 79 BMP exploit detected High MALWARE 80 EMF exploit detected High MALWARE 81 Malicious DNS usage detected High MALWARE 82 Email harvesting High MALWARE 83 Browser-based exploit detected High MALWARE 85 Suspicious file download Low MALWARE 86 Suspicious file download High MALWARE 87 Exploit payload detected High MALWARE 88 Downloaded file matches a known malware filename High MALWARE 89 Downloaded file matches a known spyware filename High MALWARE 90 Suspicious packed file transferred through TFTP High MALWARE A-41 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-42 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 91 Executable file transferred through TFTP Medium MALWARE 92 Phishing site access attempted Medium MALWARE 93 Keylogged data uploaded High MALWARE 94 SQL Injection High MALWARE 95 Successful brute-force attack High OTHERS 96 Email message contains a suspicious link to a possible phishing site High FRAUD 97 Suspicious HTTP Post High OTHERS 98 Unidentified protocol is using the standard service port High OTHERS 99 Suspicious IFrame High MALWARE 100 BOT IRC nickname detected High MALWARE 101 Suspicious DNS Medium MALWARE 102 Successful logon made using a default email account High OTHERS 104 Possible Gpass tunneling detected Low OTHERS 105 Pseudorandom Domain name query Low MALWARE 106 Info-Stealing malware detected Low MALWARE 107 Info-Stealing malware detected Low MALWARE 108 Info-Stealing malware detected Low MALWARE 109 Malware URL access attempted High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 110 Data Stealing malware URL access attempted High MALWARE 111 Malware URL access attempted High MALWARE 112 Data Stealing malware URL access attempted High MALWARE 113 Data Stealing malware sent email High MALWARE 114 Data Stealing malware sent email High MALWARE 115 Data Stealing malware FTP connection attempted High MALWARE 116 DNS query of a known public IRC C&C domain Medium MALWARE 117 Data Stealing malware IRC Channel detected High MALWARE 118 IRC connection established with known public IRC C&C IP address Medium MALWARE 119 Data Stealing malware sent instant message High MALWARE 120 Malware IP address accessed High MALWARE 121 Malware IP address/Port pair accessed High MALWARE 122 Info-Stealing malware detected Medium MALWARE 123 Possible malware HTTP request Low MALWARE 126 Possible malware HTTP request Medium MALWARE A-43 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-44 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 127 Malware HTTP request High MALWARE 128 TROJ_MDROPPER HTTP request Low MALWARE 130 IRC Test pattern Low MALWARE 131 Malware HTTP request High MALWARE 135 Malware URL access attempted High MALWARE 136 Malware domain queried High MALWARE 137 Malware user-agent detected in HTTP request High MALWARE 138 Malware IP address accessed High MALWARE 139 Malware IP address/Port pair accessed High MALWARE 140 Network based exploit attempt detected High MALWARE 141 DCE/RPC Exploit attempt detected High MALWARE 142 Data Stealing malware IRC Channel connection detected High MALWARE 143 Malicious remote command shell detected High OTHERS 144 Data Stealing malware FTP connection attempted High MALWARE 145 Malicious email sent High MALWARE 150 Remote Command Shell Low OTHERS 151 Hacktool ASPXSpy for Webservers Low OTHERS Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 153 DOWNAD Encrypted TCP connection detected Low MALWARE 155 DHCP-DNS Changing malware High MALWARE 158 FAKEAV URI detected High MALWARE 159 Possible FakeAV URL access attempted Low MALWARE 160 ZEUS HTTP request detected High MALWARE 161 CUTWAIL URI detected High MALWARE 162 DONBOT SPAM detected High MALWARE 163 HTTP Suspicious URL detected Medium MALWARE 164 PUSHDO URI detected High MALWARE 165 GOLDCASH HTTP response detected High MALWARE 167 MYDOOM Encrypted TCP connection detected High MALWARE 168 VUNDO HTTP request detected High MALWARE 169 HTTP Meta tag redirect to an executable detected Medium MALWARE 170 HTTP ActiveX Codebase Exploit detected Medium MALWARE 172 Malicious URL detected High MALWARE 173 PUBVED URI detected High MALWARE 178 FAKEAV HTTP response detected High MALWARE A-45 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-46 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 179 FAKEAV HTTP response detected High MALWARE 182 FAKEAV HTTP response detected High MALWARE 183 MONKIF HTTP response detected High MALWARE 185 PALEVO HTTP response detected High MALWARE 189 KATES HTTP request detected High MALWARE 190 KATES HTTP response detected High MALWARE 191 BANKER HTTP response detected High MALWARE 195 DOWNAD HTTP request detected Medium MALWARE 196 GUMBLAR HTTP response detected Medium MALWARE 197 BUGAT HTTPS connection detected High MALWARE 199 GUMBLAR HTTP response detected High MALWARE 200 GUMBLAR HTTP response detected High MALWARE 206 BANDOK URI detected High MALWARE 207 RUSTOCK HTTP request detected High MALWARE 208 CUTWAIL HTTP request detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 209 NUWAR URI detected High MALWARE 210 KORGO URI detected High MALWARE 211 PRORAT URI detected High MALWARE 212 NYXEM HTTP request detected High MALWARE 213 KOOBFACE URI detected High MALWARE 214 BOT URI detected High MALWARE 215 ZEUS URI detected High MALWARE 216 PRORAT SMTP request detected High MALWARE 217 DOWNLOAD URI detected High MALWARE 218 SOHANAD HTTP request detected High MALWARE 219 RONTOKBRO HTTP request detected High MALWARE 220 HUPIGON HTTP request detected High MALWARE 221 FAKEAV HTTP request detected High MALWARE 224 AUTORUN URI detected High MALWARE 226 BANKER SMTP connection detected High MALWARE 227 AGENT User Agent detected High MALWARE 229 HTTPS Malicious Certificate detected Medium MALWARE A-47 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-48 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 230 HTTPS Malicious Certificate detected Medium MALWARE 231 HTTPS Malicious Certificate detected Medium MALWARE 232 HTTPS Malicious Certificate detected Medium MALWARE 233 DAWCUN TCP connection detected High MALWARE 234 HELOAG TCP connection detected High MALWARE 235 AUTORUN HTTP request detected High MALWARE 236 TATERF URI detected High MALWARE 237 NUWAR HTTP request detected High MALWARE 238 EMOTI URI detected High MALWARE 239 FAKEAV HTTP response detected Medium MALWARE 240 HUPIGON User Agent detected High MALWARE 241 HTTP Suspicious response detected Medium MALWARE 246 BHO URI detected High MALWARE 247 ZBOT HTTP request detected High MALWARE 249 ZBOT URI detected High MALWARE 250 ZBOT IRC channel detected High MALWARE 251 KOOBFACE URI detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 252 BREDOLAB HTTP request detected High MALWARE 253 RUSTOCK URI detected High MALWARE 255 FAKEAV HTTP request detected High MALWARE 256 SILLY HTTP response detected High MALWARE 257 KOOBFACE HTTP request detected High MALWARE 258 FAKEAV HTTP request detected High MALWARE 259 FAKEAV HTTP request detected High MALWARE 260 FAKEAV HTTP request detected High MALWARE 261 FAKEAV HTTP request detected High MALWARE 262 FAKEAV URI detected High MALWARE 263 AUTORUN URI detected High MALWARE 264 ASPORX HTTP request detected High MALWARE 265 AUTORUN HTTP request detected High MALWARE 266 GOZI HTTP request detected High MALWARE 267 AUTORUN URI detected High MALWARE 268 KOOBFACE HTTP request detected High MALWARE A-49 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-50 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 269 AUTORUN IRC nickname detected High MALWARE 270 VIRUT IRC response detected High MALWARE 271 AUTORUN HTTP request detected High MALWARE 272 AUTORUN HTTP request detected High MALWARE 273 AUTORUN HTTP request detected High MALWARE 274 CAOLYWA HTTP request detected High MALWARE 275 AUTORUN FTP connection detected High MALWARE 276 AUTORUN HTTP request detected High MALWARE 277 AUTORUN HTTP response detected High MALWARE 278 AUTORUN HTTP request detected High MALWARE 279 AUTORUN HTTP request detected High MALWARE 280 AUTORUN HTTP request detected High MALWARE 281 BUZUS HTTP request detected High MALWARE 282 FAKEAV HTTP request detected High MALWARE 283 FAKEAV HTTP request detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 284 AGENT HTTP request detected High MALWARE 285 AGENT TCP connection detected High MALWARE 286 KOLAB IRC nickname detected High MALWARE 287 VB MSSQL Query detected High MALWARE 288 PROXY URI detected High MALWARE 289 LDPINCH HTTP request detected High MALWARE 290 SWISYN URI detected High MALWARE 291 BUZUS HTTP request detected High MALWARE 292 BUZUS HTTP request detected High MALWARE 295 SCAR HTTP request detected High MALWARE 297 ZLOB HTTP request detected High MALWARE 298 HTTBOT URI detected High MALWARE 299 HTTBOTUser Agent detected High MALWARE 300 HTTBOT HTTP request detected High MALWARE 301 SASFIS URI detected High MALWARE 302 SWIZZOR HTTP request detected High MALWARE 304 PUSHDO TCP connection detected High MALWARE A-51 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-52 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 306 BANKER HTTP request detected High MALWARE 307 GAOBOT IRC channel detected High MALWARE 308 SDBOT IRC nickname detected High MALWARE 309 DAGGER TCP connection detected High MALWARE 310 HACKATTACK TCP connection detected High MALWARE 312 CODECPAC HTTP request detected High MALWARE 313 BUTERAT HTTP request detected High MALWARE 314 FAKEAV HTTP request detected High MALWARE 315 CIMUZ URI detected High MALWARE 316 DEMTRANNC HTTP request detected High MALWARE 317 ENFAL HTTP request detected High MALWARE 318 WEMON HTTP request detected High MALWARE 319 VIRTUMONDE URI detected Medium MALWARE 320 DROPPER HTTP request detected High MALWARE 321 MISLEADAPP HTTP request detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 322 DLOADER HTTP request detected High MALWARE 323 SPYEYE HTTP request detected High MALWARE 324 SPYEYE HTTP response detected High MALWARE 325 SOPICLICK TCP connection detected High MALWARE 326 KOOBFACE HTTP request detected High MALWARE 327 PALEVO UDP connection detected High MALWARE 328 AGENT Malformed SSL detected High MALWARE 329 OTLARD TCP connection detected High MALWARE 330 VUNDO HTTP request detected High MALWARE 331 HTTP Suspicious User Agent detected Medium MALWARE 332 VBINJECT IRC connection detected High MALWARE 333 AMBLER HTTP request detected High MALWARE 334 RUNAGRY HTTP request detected High MALWARE 337 BUZUS IRC nickname detected High MALWARE A-53 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-54 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 338 TEQUILA HTTP request detected High MALWARE 339 FAKEAV HTTP request detected High MALWARE 340 CUTWAIL SMTP connection detected High MALWARE 341 MUMA TCP connection detected High MALWARE 342 MEGAD SMTP response detected High MALWARE 343 WINWEBSE URI detected High MALWARE 344 VOBFUS TCP connection detected High MALWARE 345 BOT IRC nickname detected High MALWARE 347 BOT IRC nickname detected High MALWARE 348 TIDISERV HTTP request detected High MALWARE 349 BOT HTTP request detected High MALWARE 351 ZLOB HTTP request detected High MALWARE 352 SOHANAD HTTP request detected High MALWARE 353 GENETIK HTTP request detected High MALWARE 354 LEGMIR HTTP request detected High MALWARE 355 HUPIGON HTTP request detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 356 IEBOOOT UDP connection detected High MALWARE 357 FAKEAV HTTP request detected High MALWARE 358 FAKEAV HTTP request detected High MALWARE 359 STRAT HTTP request detected High MALWARE 360 STRAT HTTP request detected High MALWARE 361 STRAT HTTP request detected High MALWARE 362 SALITY URI detected High MALWARE 363 AUTORUN HTTP response detected High MALWARE 364 AUTORUN HTTP request detected High MALWARE 365 CODECPAC HTTP request detected High MALWARE 366 TRACUR HTTP request detected High MALWARE 367 KOLAB TCP connection detected High MALWARE 368 MAGANIA HTTP request detected High MALWARE 369 PAKES URI detected High MALWARE 370 POSADOR HTTP request detected High MALWARE 371 FAKEAV HTTP request detected High MALWARE A-55 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-56 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 372 GHOSTNET TCP connection detected High MALWARE 373 CLICKER HTTP response detected High MALWARE 374 VIRUT HTTP request detected High MALWARE 375 FAKEAV HTTP request detected High MALWARE 376 DLOADER HTTP request detected High MALWARE 377 FAKEAV HTTP request detected High MALWARE 378 DLOADER HTTP request detected High MALWARE 379 GENOME HTTP request detected High MALWARE 380 GENOME HTTP request detected High MALWARE 381 GENOME HTTP request detected High MALWARE 382 GENOME HTTP request detected High MALWARE 383 GENOME HTTP request detected High MALWARE 384 GENOME HTTP request detected High MALWARE 385 FAKEAV URI detected High MALWARE 386 UTOTI URI detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 387 THINSTALL HTTP request detected High MALWARE 389 GERAL HTTP request detected High MALWARE 390 UNRUY HTTP request detected High MALWARE 392 BREDOLAB HTTP request detected High MALWARE 393 ZAPCHAST URI detected High MALWARE 395 KOOBFACE HTTP request detected High MALWARE 396 KOOBFACE URI detected High MALWARE 397 BIFROSE TCP connection detected High MALWARE 398 ZEUS HTTP request detected Medium MALWARE 399 MUFANOM HTTP request detected High MALWARE 400 STARTPAGE URI detected High MALWARE 401 Suspicious File transfer of an LNK file detected Medium MALWARE 402 TDSS URI detected High MALWARE 403 CODECPAC HTTP request detected High MALWARE 404 DOWNAD TCP connection detected High MALWARE 405 SDBOT HTTP request detected High MALWARE A-57 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-58 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 406 MYDOOM HTTP request detected High MALWARE 407 GUMBLAR HTTP request detected Medium MALWARE 408 POEBOT IRC bot commands detected High MALWARE 409 SDBOT IRC connection detected High MALWARE 410 HTTP DLL inject detected Medium OTHERS 411 DANMEC HTTP request detected High MALWARE 412 MOCBBOT TCP connection detected High MALWARE 413 OSCARBOT IRC connection detected High MALWARE 414 STUXNET SMB connection detected High MALWARE 415 SALITY SMB connection detected Medium MALWARE 416 SALITY URI detected High MALWARE 417 BUZUS IRC nickname detected Medium MALWARE 418 VIRUT IRC channel detected Medium MALWARE 419 LICAT HTTP request detected Medium MALWARE 420 PROXY HTTP request detected High MALWARE 421 PROXY HTTP request detected High MALWARE Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 422 QAKBOT HTTP request detected High MALWARE 423 FAKEAV HTTP request detected Medium MALWARE 424 QAKBOT FTP dropsite detected High MALWARE 425 QAKBOT HTTP request detected High MALWARE 426 SALITY HTTP request detected Medium MALWARE 427 AURORA TCP connection detected Medium MALWARE 428 KOOBFACE HTTP request detected High MALWARE 429 KOOBFACE HTTP request detected High MALWARE 430 KOOBFACE HTTP request detected High MALWARE 431 SPYEYE HTTP request detected High MALWARE 432 KELIHOS HTTP request detected Medium MALWARE 433 KELIHOS TCP connection detected Medium MALWARE 434 BOHU URI detected Medium MALWARE 435 UTOTI HTTP request detected Medium MALWARE 436 CHIR UDP connection detected Medium MALWARE A-59 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-60 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 437 REMOSH TCP connection detected High MALWARE 438 ALUREON URI detected Medium MALWARE 439 FRAUDPACK URI detected Medium MALWARE 440 FRAUDPACK URI detected Medium MALWARE 441 SMB DLL injection exploit detected Medium OTHERS 443 QDDOS HTTP request detected High MALWARE 444 QDDOS HTTP request detected High MALWARE 445 QDDOS TCP connection detected High MALWARE 446 OTORUN HTTP request detected Medium MALWARE 447 OTORUN HTTP request detected Medium MALWARE 448 QAKBOT HTTP request detected Medium MALWARE 450 FAKEAV HTTP request detected High MALWARE 451 FAKEAV URI detected High MALWARE 452 LIZAMOON HTTP response detected High MALWARE 453 Compromised site with malicious URL detected Medium OTHERS 454 Compromised site with malicious URL detected High OTHERS Additional Resources RULE ID DESCRIPTION CONFIDENCE LEVEL RISK TYPE 455 HTTP SQL Injection detected High OTHERS 456 HTTPS_Malicious_Certificate3 Medium OTHERS 457 FAKEAV HTTP request detected Medium MALWARE 994 HTTP_REQUEST_BAD_URL_ HASH Low MALWARE 1004 HTTP_REQUEST_MALWARE _URL Low MALWARE 1321 HTTP_REQUEST_TSPY_ONL INEG Low MALWARE 1342 HTTPS_Malicious_Certificate2 Low MALWARE 1343 HTTPS_Malicious_Certificate2 Low MALWARE 1344 HTTPS_Malicious_Certificate2 Low MALWARE 1345 HTTPS_Malicious_Certificate2 Low MALWARE 1365 REALWIN_LONG_USERNAM E_EXPLOIT Low OTHERS 1366 REALWIN_STRING_STACK_ OVERFLOW_EXPLOIT Low OTHERS 1367 REALWIN_FCS_LOGIN_STA CK_OVERFLOW_EXPLOIT Low OTHERS 1368 REALWIN_FILENAME_STAC K_OVERFLOW_EXPLOIT Low OTHERS 1369 REALWIN_MSG_STACK_OVE RFLOW_EXPLOIT Low OTHERS 1370 REALWIN_TELEMETRY_STA CK_OVERFLOW_EXPLOIT Low OTHERS A-61 Deep Discovery Analyzer 5.0 Administrator's Guide RULE ID A-62 DESCRIPTION CONFIDENCE LEVEL RISK TYPE 1371 REALWIN_STARTPROG_STA CK_OVERFLOW_EXPLOIT Low OTHERS 1372 Interactive_Graphical_SCADA _System_Program_Execution_ Exploit Low OTHERS 1373 Interactive_Graphical_SCADA _System_STDREP_Overflow_ Exploit Low OTHERS 1374 Interactive_Graphical_SCADA _System_Shmemmgr_Overflo w_Exploit Low OTHERS 1375 Interactive_Graphical_SCADA _System_RMS_Report_Overfl ow_Exploit Low OTHERS 1376 Interactive_Graphical_SCADA _System_File_Funcs_Overflow _Exploit Low OTHERS Index A account management, 7-16 Activation Code, 7-22 administration, 5-32 archive file passwords, 5-32 API key, 7-25 C C&C list, 5-16 community, 8-2 components, 7-2 updates, 7-2 contact management, 7-19 customized alerts and reports, 6-8 custom network, 2-2 custom port, 2-4 G generated reports, 6-2 getting started tasks, 3-9 H hot fix, 7-4 I images, 5-27, 5-28 integration with other Trend Micro products, 3-10 IP addresses (for product), 2-4 L license, 7-22 log settings, 7-15 syslog server, 7-15 D dashboard, 4-6 dashboard tabs, 4-2 overview, 4-2 widgets, 4-2, 4-6 deployment tasks, 2-8 hardware setup, 2-8 installation, 2-12 M management console, 3-7 navigation, 3-8 session duration, 7-14 management console accounts, 7-16 management network, 2-2 management port, 2-4 E email scanning archive file passwords, 5-32 Ethernet cables, 2-5 exceptions, 5-19 O on-demand reports, 6-3 online community, 8-2 OVA, 5-27 F form factor, 2-2 P patch, 7-4 N network environment, 2-2 IN-1 Deep Discovery Analyzer 5.0 Administrator's Guide port, 2-4 power supply, 2-9 preconfiguration console, 3-2 operations, 3-3 product integration, 3-10 product specifications, 2-2 R reports, 6-2, 6-3 on demand, 6-3 report schedules, 6-5 S sandbox analysis, 5-2 sandbox images, 5-27, 5-28 sandbox instances, 5-30 sandbox management, 5-22 archive passwords, 5-32 images, 5-27 importing, 5-28 modifying instances, 5-30 image status, 5-23 network connection, 5-25 Virtual Analyzer status, 5-23 service pack, 7-4 session duration (for management console), 3-8 software on sandbox image, A-16 submissions, 5-2 manual submission, 5-14 support knowledge base, 8-2 resolve issues faster, 8-4 TrendLabs, 8-6 suspicious objects, 5-16 syslog server, 7-15 system settings, 7-6 IN-2 Date and Time Tab, 7-11 Host Name and IP Address Tab, 7-7 Password Policy Tab, 7-13 Power Off / Restart Tab, 7-14 Proxy Settings Tab, 7-9 Session Timeout Tab, 7-14 SMTP Settings Tab, 7-10 T tabs in dashboard, 4-3 third-party licenses, 7-25 tools, 7-21 TrendLabs, 8-6 U updates, 7-2 component updates, 7-2 product updates, 7-4 update settings, 7-3 V Virtual Analyzer, 5-2, 5-32 archive file passwords, 5-32 Virtual Analyzer image, A-16, A-18 Virtual Analyzer Sensors, A-18 W widgets, 4-4 add, 4-6