, 6 tweets, 2 min read
My Authors
Read all threads
1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.
2\ The timestamp field poses a low-key problem for attackers. If they leave the compiler-assigned value they reveal telling details. If they assign a concocted value, their tampering can make them easier to detect. Here's an 'allaple' malware set's random, insane timestamps:
3\ Now let's look at a big malware dataset's compile timestamp behavior. Notice the straight horizontal lines. Those are unique polymorphic hashes reusing the *same* compile timestamp month after month. Also, notice the number of insane back-to-the-future timestamps.
4\ In contrast, benign files' timestamp behavior is far more well behaved. That line at 1993 is a special case: Delphi binaries all have that timestamp field setting, regardless of when they were created.
5\ From an ML and signatures perspective, the detection signal here comes from two places: 1) there are exact-match timestamps that allow us to detect entire toolkits and polymorphic families. 2) Pathological timestamps are far more likely to come from malware.
6\ The timestamp field has a non-linear (to say the least) but high mutual information relationship with the bad/good labels. Decision trees are a natural modeling fit here. Here's the ROC curve we get when we fit a random forest detector on just the timestamp feature.
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Joshua Saxe

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!