Research Article

Using a Subtractive Center Behavioral Model to Detect Malware

Table 4

Sample malware execution trace and behaviors (list is abbreviated).

Action callSystem pathExtracted behavior

NtCreateFile“c:\windows\...\sfile1.exe,” malware.exe ⟶ 1CreateFile (1)
NtCreateFile“c:\programfiles\...\,” malware.exe ⟶ 2none
NtQueryDirectory2, “c:\programfiles\...\,” malware.exe ⟶ 3SearchDirectory (2)
NtReadFile3, “c:\...\tfile1.txt,” malware.exe ⟶ 4ReadFile (3)
NtReadFile3, “c:\...\tfile2.exe,” malware.exe ⟶ 5ReadFile (3)
NtCloseFile4, “tfile1.txt,” malware.exe ⟶ 6none
NtWriteFile1, “sfile1.exe,” malware.exe ⟶ 7WriteFile (1)
NtReadFile7, “sfile1.exe,” malware.exe ⟶ 8ReadFile (7)
NtWriteFile5, “tfile2.exe,” sfile1.exe ⟶ 9WriteFile (5)
NtCreateKey“hklm\software\...\, key1,” tfile2.exe ⟶ 10none
NtSetValue10, “key1,” tfile2.exe ⟶ 11SetValue (10)
NtRegCloseKey11, “key1,” tfile2.exe ⟶ 12none
NtCreateFile“c:\windows\...\stfile1.dll,” tfile2.exe ⟶ 13none
NtCreateFile“c:\windows\...\stfile2.dll,” tfile2.exe ⟶ 14none
NtCloseFile8, “sfile1.exe,” malware.exe ⟶ 15none
NtReadFile13, “stfile1.dll,” tfile2.exe ⟶ 16ReadFile (13)
NtReadFile13, “stfile1.dll,” tfile2.exe ⟶ 17ReadFile (13)
NtReadFile14, “stfile2.dll,” tfile2.exe ⟶ 18ReadFile (14)
NtCloseFile17, “stfile1.dll,” tfile2.exe ⟶ 19none
NtCloseFile18, “stfile2.dll,” tfile2.exe ⟶ 20none
NtCloseFile9, “tfile2.exe,” tfile2.exe ⟶ 21none