Malware Static Analysis on Microsoft Macro Attack

Authors

  • Redho Maland Aresta Universitas Amikom Yogyakarta
  • Ero Wahyu Pratomo Universitas Amikom Yogyakarta
  • Vicky Geraldino Universitas Amikom Yogyakarta
  • Achmad Fauzi Universitas Amikom Yogyakarta
  • Joko Dwi Santoso Universitas Amikom Yogyakarta

DOI:

https://doi.org/10.12928/mf.v3i1.3764

Keywords:

Malware Analysis, Static Analysis, Dynamic Analysis, Cyber-attack, Macro Malware

Abstract

In the 21st century, technology is increasing rapidly, the increase in technology is the potential for cyber attacks on today's technological infrastructure. Malware that is designed to damage computer systems without the owner's knowledge at a considerable cost becomes a cyber crime. This macro malware analysis is to study the code and behavior of malware when run on an operating system. To analyze this malware, this study uses a static analysis method by analyzing malware without running the program.

References

S. Saad, W. Briguglio, and H. Elmiligi, ‘The Curious Case of Machine Learning In Malware Detection’, arXiv:1905.07573 [cs], May 2019, Accessed: Feb. 11, 2022. [Online]. Available: http://arxiv.org/abs/1905.07573

J. C. Sapalo Sicato, P. K. Sharma, V. Loia, and J. H. Park, ‘VPNFilter Malware Analysis on Cyber Threat in Smart Home Network’, Applied Sciences, vol. 9, no. 13, p. 2763, Jul. 2019, doi: 10.3390/app9132763.

H. F. Atlam, E. El-Din Hemdan, A. Alenezi, M. O. Alassafi, and G. B. Wills, ‘Internet of Things Forensics: A Review’, Internet of Things, vol. 11, p. 100220, Sep. 2020, doi: 10.1016/j.iot.2020.100220.

B. Yu, Y. Fang, Q. Yang, Y. Tang, and L. Liu, ‘A survey of malware behavior description and analysis’, Frontiers Inf Technol Electronic Eng, vol. 19, no. 5, pp. 583–603, May 2018, doi: 10.1631/FITEE.1601745.

P. Singh, S. Tapaswi, and S. Gupta, ‘Malware Detection in PDF and Office Documents: A survey’, Information Security Journal: A Global Perspective, vol. 29, no. 3, pp. 134–153, May 2020, doi: 10.1080/19393555.2020.1723747.

M. Elingiusti, L. Aniello, L. Querzoni, and R. Baldoni, ‘PDF-Malware Detection: A Survey and Taxonomy of Current Techniques’, in Cyber Threat Intelligence, vol. 70, A. Dehghantanha, M. Conti, and T. Dargahi, Eds. Cham: Springer International Publishing, 2018, pp. 169–191. doi: 10.1007/978-3-319-73951-9_9.

E. G. Dada, J. S. Bassi, H. Chiroma, S. M. Abdulhamid, A. O. Adetunmbi, and O. E. Ajibuwa, ‘Machine learning for email spam filtering: review, approaches and open research problems’, Heliyon, vol. 5, no. 6, p. e01802, Jun. 2019, doi: 10.1016/j.heliyon.2019.e01802.

A. Karim, S. Azam, B. Shanmugam, K. Kannoorpatti, and M. Alazab, ‘A Comprehensive Survey for Intelligent Spam Email Detection’, IEEE Access, vol. 7, pp. 168261–168295, 2019, doi: 10.1109/ACCESS.2019.2954791.

L. Jaeger, ‘Information Security Awareness: Literature Review and Integrative Framework’, presented at the Hawaii International Conference on System Sciences, 2018. doi: 10.24251/HICSS.2018.593.

J. G. Drever, B. Third, and C. Sampson, ‘The use of static analysis to detect malware in embedded systems’, in 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Cardiff, UK, 2013, p. 6.2-6.2. doi: 10.1049/cp.2013.1722.

U. Mishra, ‘Detecting Macro Viruses- A TRIZ Based Analysis’, SSRN Journal, 2012, doi: 10.2139/ssrn.1981892.

D. Ucci, L. Aniello, and R. Baldoni, ‘Survey of machine learning techniques for malware analysis’, Computers & Security, vol. 81, pp. 123–147, Mar. 2019, doi: 10.1016/j.cose.2018.11.001.

S. Sibi Chakkaravarthy, D. Sangeetha, and V. Vaidehi, ‘A Survey on malware analysis and mitigation techniques’, Computer Science Review, vol. 32, pp. 1–23, May 2019, doi: 10.1016/j.cosrev.2019.01.002.

Q.-D. Ngo, H.-T. Nguyen, V.-H. Le, and D.-H. Nguyen, ‘A survey of IoT malware and detection methods based on static features’, ICT Express, vol. 6, no. 4, pp. 280–286, Dec. 2020, doi: 10.1016/j.icte.2020.04.005.

S. K. Nayak and A. C. Ojha, ‘Data Leakage Detection and Prevention: Review and Research Directions’, in Machine Learning and Information Processing, vol. 1101, D. Swain, P. K. Pattnaik, and P. K. Gupta, Eds. Singapore: Springer Singapore, 2020, pp. 203–212. doi: 10.1007/978-981-15-1884-3_19.

M. N. Alenezi, H. Alabdulrazzaq, A. A. Alshaher, and M. M. Alkharang, ‘Evolution of Malware Threats and Techniques: A Review’, vol. 12, no. 3, p. 12, 2020.

A. Kumar, M. Gupta, G. Kumar, A. Handa, N. Kumar, and S. K. Shukla, ‘A Review: Malware Analysis Work at IIT Kanpur’, in Cyber Security in India, vol. 4, S. K. Shukla and M. Agrawal, Eds. Singapore: Springer Singapore, 2020, pp. 39–48. doi: 10.1007/978-981-15-1675-7_5.

D. Maimon and E. R. Louderback, ‘Cyber-Dependent Crimes: An Interdisciplinary Review’, Annu. Rev. Criminol., vol. 2, no. 1, pp. 191–216, Jan. 2019, doi: 10.1146/annurev-criminol-032317-092057.

Md. F. Sohan and A. Basalamah, ‘A Systematic Literature Review and Quality Analysis of Javascript Malware Detection’, IEEE Access, vol. 8, pp. 190539–190552, 2020, doi: 10.1109/ACCESS.2020.3031690.

P. Romaniuk, ‘Crime and Criminal Justice’, in The Oxford Handbook on the United Nations, T. G. Weiss and S. Daws, Eds. Oxford University Press, 2018, pp. 514–527. doi: 10.1093/oxfordhb/9780198803164.013.28.

Downloads

Published

2021-07-13

Issue

Section

Articles