Blue Coat Malware Analysis Appliance V4.2.8 Intellivm Profile Customization Guide
Blue Coat Malware Analysis Appliance V4.2.8 Intellivm Profile Customization Guide
Blue Coat Malware Analysis Appliance V4.2.8 Intellivm Profile Customization Guide
8
IntelliVM Profile Customization Guide
16 June 2017
1. ABOUT ........................................... 3
6.4. Microsoft Silverlight .......................................... 42
1.1. About this Guide ................................................. 3 6.5. Java .................................................................. 43
1.2. System Requirements ........................................ 3
6.6 Detect Unknown Exploits with EMET................... 46
1.3. Help and Support ............................................... 3
6.6. Final Enhanced Windows 7 Profile .................. 50
2. INTELLIVM PROFILES ............................................. 4 7. ENHANCE THE WINDOWS 8 PROFILE ................ 52
2.1. IntelliVM Overview.............................................. 4
7.1. Adobe Reader .................................................. 54
2.2. Base Images ...................................................... 4 7.2. Microsoft .NET Framework 3.5 SP1 ................ 57
2.3. Profiles ............................................................... 5 7.3. Microsoft Silverlight .......................................... 58
3. CUSTOMIZING VM PROFILES .... 6 7.4. Java .................................................................. 59
3.1 Build a New Profile ............................................. 6 7.5. Detect Unknown Exploits with EMET............... 61
3.2 Disable Automatic Update Checks................... 10 7.6. Final Enhanced Windows 8 Profile .................. 65
3.3 Application Installation ..................................... 11 8. CUSTOMIZE AN OFFICE 2010 PROFILE FOR
3.4 Finalize and Build the Profile............................ 13 MALWARE DETONATION ............................................... 66
3.5 Modifying Profiles ............................................. 14
3.6 Deleting Profiles ............................................... 14
1. About
This manual is intended for malware analysts and researchers who are utilizing the Blue Coat Systems Malware
Analysis appliance (MA) solution and are interested in optimizing malware detection via the use of IntelliVM (iVM)
profiles. It discusses detailed installation processes for Windows XP and Windows 7; other versions of Windows will
follow very similar procedures.
This manual assumes that the reader is well versed in network terminology and operations, and is familiar with
malware in general and malware analysis in particular. An understanding of Windows system events and network
intrusion techniques is helpful as well.
The Malware Analysis appliance contains all of the necessary hardware, software, and connectivity needed to analyze
malware in isolated or networked environments right out of the box using sophisticated iVM profiles that can be
configured to mimic “typical” Windows systems or actual production configurations.
Customizing iVM profiles is accomplished via Remote Desktop connections using built-in or easily accessible open-
source tools, connecting to publicly accessible websites for component downloads and updates.
We strongly recommend that you read this guide thoroughly before installing Malware Analysis appliance and
attempting to configure iVM profiles, and that you use it as a reference during installation, configuration, and ongoing
usage.
In this guide, you will find instructions on how to install and configure iVM base profiles and how to customize these
base images into highly-realistic approximations of production systems used within your organization.
Support
If you encounter any difficulty with the setup or usage of the Malware Analysis appliance in general, or the
configuration or usage of iVM profiles in particular, please contact your Symantec sales representative or sales
engineer, or visit our Support website at https://support.symantec.com/en_US/contact-support.html.
2. IntelliVM Profiles
IntelliVM kernel technology monitors system events for signs of malicious behavior in a virtualized environment.
Profiles can be customized to add flexibility to analyze non-traditional malware and to precisely mirror custom
environments to detect advanced and targeted threats.
Virtual machines (VMs) are software implementations of computer systems that execute programs just like physical
machines, without putting real PCs at risk of malware infection. By using VM profiles to mirror multiple environments,
analysts can quickly spot anomalies and differences in behavior that unveil anti-analysis and other advanced malware
evasion techniques. VMs can easily be setup to match various Windows XP, Windows 7 (32-bit and 64-bit), and
Windows 8 (64-bit) environments – such as patched and unpatched versions running alternate applications, browsers,
and plugins – to quickly spot different malicious behaviors on multiple system types. VMs easily revert to a known
non-infected state for repeat testing.
Figure 1– Available IntelliVM Profiles with Windows 7 set as the Default Profile
Base images include complete Windows operating systems along with a number of preinstalled applications or
components used to facilitate malware detection from various file types. Base images do not run directly within
Malware Analysis appliance. Instead, they are used to create profiles which actually run within the IntelliVM virtual
machine framework.
Four (4) base images presently ship with Malware Analysis appliance v4.2.8:
• Windows XP, Service Pack 3 (32-bit)
• Windows 7, Service Pack 1 (32-bit)
• Windows 7, Service Pack 1 (64-bit)
• Windows 8 (64-bit)
Note Base images ship from the factory and can be modified or deleted by the customer. Users
cannot add new base images; however they can create an unlimited number of custom profiles
derived from the existing base images.
2.3. Profiles
Profiles are ready-to-run encapsulations of base images plus additional customizations designed to replicate
particular Windows environments. These customizations include commercial applications, custom applications,
additional web browsers, and patches to components including applying Windows Updates to plug security
vulnerabilities as they are released by Microsoft Customizing profiles allows the customer to run additional file types
through the analysis process with each one running within its own native application.
• Standard Profiles – Malware Analysis appliance ships with four (4) standard profiles: Windows XP SP3,
Windows 7 SP1 32-bit, Windows 7 SP1 64-bit, and Windows 8 64-bit
The preinstalled standard profiles are built from their respective base images.
• Default Profile – The profile that runs “automatically” when no particular profile is specified. This profile often
represents the most organization’s most prevalent configuration. Only one profile can be the default at a time.
3. Customizing VM Profiles
Administrative users can create, modify, or delete VM profiles at any time. Create VM profiles as needed to closely
replicate production environments, or to test the behavior of malware across different configurations.
Example: Analysis of potential malicious sample on Sales, Engineering, and Accounting workstations.
Profile Name Enter a meaningful name for the profile. The name is mandatory.
Base Image Select the desired image, the ‘starting point’ for the new profile. This is mandatory.
Example:
Description List the contents of the profile in as much detail as desired. The description is optional.
Example: Windows 7 (SP1) with Microsoft Office 2010 and Internet Explorer 10
4. Click to create the profile after entering all selections. The IntelliVM Profiles page is
displayed again, with the new profile in the list.
Note Before a profile has been built, you may click Edit Details to change the base image. After the profile
has been built, you cannot change the base image.
5. Click Build Profile. The Customize IntelliVM Profile: [Profile Name] page is displayed.
Several minutes will elapse while the profile is prepared for customization.
Caution While you are in customization mode, all processing in all IntelliVMs is suspended.
When the profile is ready for customization, the following message is displayed: To manually customize your profile you
can connect via RDP to on port 3389/tcp. Default login credentials are "admin" with no password.
Note Blue Coat recommends that you not close your browser while customizing a profile.
7. On a Windows workstation, launch Remote Desktop Connection. The Remote Desktop Connection dialog is
displayed.
• For Computer, type the IP address of the Malware Analysis appliance and the port number in the following
format: <ip_address>:3389.
• Click Connect, and then click OK. The desktop of the iVM is displayed.
Windows Example
3 Click the Updates tab, and verify that Never check for updates is selected.
4 Launch the Adobe Reader, select Edit > Preferences, select Updater from the Categories list, and verify that Do not
download or install updates automatically is selected.
5 For any other non-Microsoft applications that are on the iVM or that you later install, verify that the automatic update
checks are disabled.
6 Do you want to further customize the iVM profile?
Note The customer is responsible for obtaining the appropriate licenses for software that is installed on the
iVMs. Contact the vendors of the respective software to obtain the proper license type for the iVMs.
To transfer installation files to your iVM, use one of the following methods:
• Use Remote Desktop Sharing. In the Remote Desktop Connection window, go to Options > Local
Resources > More… > Local devices and resources. Select the location to map.
Figure 13 — Network
Copy the files across as required.
• Connect to the Internet to download software from an Internet resource or vendor site. (This
connection is made through the Backend interface.)
Note To use a different proxy to access the Internet from inside the iVM, configure that proxy inside the
iVM's Windows environment.
o The tsclient entity is the workstation that is accessing the iVM via Remote Desktop.
Install, license, and configure the applications to resemble a typical computing environment at your organization.
Note Your specific remote desktop client will determine which resources are available and the various
methods that you can use to add software to a VM profile. Specific procedures are beyond the scope of
this guide.
Blue Coat recommends using a shared drive or folder to add software to a VM profile.
Disconnect the connection to the virtual Windows system by clicking and selecting Disconnect.
5. The new profile is ready for use. You may begin to send samples to the new profile, or you may select
one of the following:
• Edit Details — Return to the Creating New IntelliVM Profile page and change the description or
name. (You cannot change the base image of an already-built profile.)
• Delete Profile — Click to delete the profile. This action cannot be undone.
• To modify the details, click Edit Details. Edit either the profile name or its description, and then click
Save Changes.
• To modify a profile, click Customize Profile, and then follow the instructions in steps 0 through to
access the iVM through Remote Desktop. When you have finished the modifications, you must build
the profile again.
Caution Deleting a profile cannot be undone. If you do not intend to deactivate a particular base image,
do not delete the last profile that is associated with that image. Deleting a profile that has tasks assigned
to it will result in an IVM_Error when that task reaches the top of the queue.
4. Optimizing Profiles
Malware Analysis appliance ships with base images for Windows XP SP3 and Windows 7 SP1. Base images are
“starting points” for customizing robust malware detection environments. Base images may be enhanced by the
customer or the SE.
Base image contents have been specially selected to provide a robust malware testbed. As such, the preinstalled
component versions may not necessarily represent the latest versions available from their respective manufacturers.
Note Due to temporary licensing restrictions, several necessary base image components are unable to ship
from the factory preinstalled. We expect this situation to be resolved shortly.
Customize profiles to add the flexibility to analyze non-traditional malware, and to closely mirror custom environments
to detect advanced and targeted threats. Enhancing the MALWARE ANALYSIS APPLIANCE IntelliVM base images
will include adding the following components to the Windows XP SP3 and Windows 7 SP1.
• Adobe Reader
• Adobe Flash
• Microsoft .NET Framework 3.5 SP1
• Microsoft Silverlight
• Java
• Microsoft C++ Redistributable 2010
Note Adding software beyond that which is provided by the base images may require proper third-
party licenses.
The Malware Analysis Appliance comes with the following programs pre-installed. You may update them to the latest
version if you wish to.
Step 1: Inside the Windows XP virtual machine on the Desktop, press the Start button and select Control Panel.
Step 3: Inside the Add or Remove Programs window, confirm that the following programs are currently installed.
This configuration is the proper starting point for the Windows XP base image enhancement process.
Note Please contact your technical representative if your base image configuration does not
closely match Figure 20.
Figure 20 – Windows XP Add or Remove Programs displaying starting base image configuration
Step 4: Click the Internet Explorer icon on the Windows XP Desktop to open the Web browser.
Note Sections 4.1 through 4.6 all take place through the Internet Explorer Web browser interface.
Step 1: Download Adobe Reader from the following address and navigate the installer as required; decline the
Optional Offer, and click Install Now.
• http://get.adobe.com/reader/
Step 2: When the installation is complete, run the Adobe Reader application from the Desktop and accept the
End User License Agreement (EULA). The EULA appears automatically upon the first launch of the application.
Note The IntelliVMs will be unable to utilize Adobe Reader properly until the EULA has been accepted.
Click here to
accept the EULA
Step 3: Turn off automatic updates. From the Edit menu, select Preferences.
Note Updates are valuable for improving security and beneficial for the malware detection process, however
it is essential that the MALWARE ANALYSIS APPLIANCE system administrator apply all updates
manually so as to maintain configuration control over the malware testbed at all times. If components
were to be allowed to update themselves automatically at random intervals, then configuration control
becomes impractical and the administrator is never quite sure what versions of which components are
being used for malware testing.
Click here to
commit the change
Select this option
to disable
automatic updates
Step 1: Download Adobe Flash from the following address and navigate the installer as required; ; decline the
Optional Offer, and click Install Now.
http://get.adobe.com/flashplayer/
Step 2: If prompted to Update Flash Play Preferences during installation, select the following option:
Step 1: Download Microsoft .NET Framework 3.5 SP1 from this address and navigate the installer as required.
In Windows 7 .NET is part of the operating system and can be enabled under Programs and Features.
http://www.microsoft.com/en-us/download/details.aspx?id=22 *
Click here to
complete the
installation
Step 1: Download Microsoft Silverlight from this address and navigate the installer as required.
http://www.microsoft.com/silverlight/
When download
completes, click
here to run the
installer
Click here to
begin installation
Uncheck this
book to disable Click
Microsoft Update here to
proceed
6.10 Java
Step 1: Download Java from the address below and navigate the installer as required.
http://java.com/en/download/index.jsp
Click here to
run the Java
installer
Uncheck the
box to decline
the optional
browser add-on Click here to
continue the
installation
Uncheck the
box to disable Click here to
Java security continue the
prompts installation
Click here to
complete the
installation
process
Uncheck this
box to disable
automatic
updates
Click here to
confirm stoppage
of automatic
security updates
Step 1: Download Microsoft Visual C++ Redistributable 2010 from this address and navigate the installer.
http://www.microsoft.com/en-us/download/details.aspx?id=5555
Click here to
run the
downloaded
setup file
Click here
Check this install the
box to accept application
the software
license terms
Click here to
complete the
installation
process
Return to the Add or Remove Programs window in the Windows XP Control Panel (see Section 5 – Enhancing
the Windows XP Profile, Step 2) and confirm that the following programs are now installed.
This configuration is the proper ending point for the base profile enhancement process.
Note Please contact your technical representative if your base profile configuration does not closely match
Figure 52. The versions do not need to be exactly the same as depicted below, as the vendors may post
newer versions online.
Step 1: Inside the Windows 7 virtual machine on the Desktop, press the Start button and select Control Panel.
This configuration is the proper starting point for the Windows 7 base image enhancement process.
Note Please contact your technical representative if your base image configuration does not closely match
Figure 43.
Figure43 – Windows 7 Programs and Features displaying starting base image configuration
Step 4: Verify that Internet Explorer is installed and activated by clicking Turn Windows features on or off.
Click OK if you needed to turn Internet Explorer on, or click Cancel if it was already activated.
Step 4
Step 5
Figure 44
Step 5: Click the Internet Explorer icon on the Windows 7 Taskbar to open the Web browser.
Note Sections 6.1 through 6.6 all take place through the Internet Explorer Web browser interface.
http://get.adobe.com/reader/
Click here to
accept the EULA
Launch Adobe Reader
from the Windows 7
Desktop
Step 2: When the installation is complete, run the Adobe Reader application from the Desktop and accept the
End User License Agreement (EULA). The EULA appears automatically upon the first launch of the application.
Note The IntelliVMs will be unable to utilize Adobe Reader properly until the EULA has been accepted.
Step 3: Turn off automatic updates. From the Edit menu, select Preferences.
Note Updates are valuable for improving security and beneficial for the malware detection process, however
it is essential that the MALWARE ANALYSIS APPLIANCE system administrator apply all updates
manually so as to maintain configuration control over the malware testbed at all times. If components
were to be allowed to update themselves automatically at random intervals, then configuration control
becomes impractical and the administrator is never quite sure what versions of which components are
being used for malware testing.
Select
Preferences from
the Edit Menu
http://get.adobe.com/flashplayer/
Step 2: If prompted to Update Flash Play Preferences during installation, select the following option:
Note EMET requires .NET 4.5. Install the correct version for your applications.
Click OK to
commit the
change
Figure 51 – Turning on Microsoft .NET Framework 3.5.1 or 4 from the Windows Features checklist
Step 1: Download Microsoft Silverlight from this address and navigate the installer as required.
http://www.microsoft.com/silverlight/
Click here to
begin installation
Uncheck this
Click
book to disable
here to
Microsoft Update
proceed
6.17 Java
http://java.com/en/download/index.jsp
Uncheck the
box to disable
automatic
updates
Click here to
confirm that
automatic updates
will be disabled
Note Blue Coat recommends that you first deploy EMET on a new profile to verify that it works as expected.
Step 1: Create a new Windows 7 (or Windows 8) profile. EMET is not supported on Windows XP.
Step 2: Customize the profile, then log on using RDP.
Step 3: Download and install .NET Framework 4.5 on the iVM profile.
Note For EMET to work with Internet Explorer 10 on Windows 8, Microsoft KB 2790907 or a more recent
version of the Compatibility Update for Windows 8 must be installed.
Step 4: Download EMET 5.5 and the user-guide PDF from Microsoft at:
https://download.microsoft.com/download/8/E/E/8EEFD9FC-46B1-4A8B-9B5D-13B4365F8CA0/EMET%20Setup.msi ,
and begin the installation.
Step 5: On the EMET Configuration Wizard page, select Use Recommended Settings, and click Finish.
Step 6: Configure the EMET service to start automatically with no delay. Follow these steps:
1. Click Start, and search for services.msc.
2. Right click the service name, and select Properties.
2. Click Apps in the upper menu bar to open the configuration window.
3. Set your Stop on Exploit preference.
• By default EMET is set to the Default Action Stop on exploit. This is the recommended setting for
maximizing detection. However, this may not give you all the details about the attack, including second stage
malware information. Blue Coat recommends maintaining this choice for maximum detection and with simpler
configurations.
• For full attack information (and a minimal reduction in exploit detection), select Audit only. This will let the
exploit continue as long as possible, only observing. This results in significantly more information about
consecutive stages of the attack.
4. Remove any applications you don’t want to monitor, if necessary. When the Use Recommended Settings
selection is made during installation, EMET adds and configures a set of popular applications. Click Remove
Selected when you have highlighted an application in order to remove it.
5. If necessary, add a new application, highlight it in the list, and enable all mitigations for that application (unless
otherwise advised).
Note Some mitigations are not compatible with certain applications. Blue Coat recommends referring
to the following link to verify your settings, and then to deselect any incompatible mitigations:
https://support.microsoft.com/kb/2909257.
B: Start the configured applications, then click Refresh in the EMET GUI, and verify you see a green check mark in the
Running EMET column.
Step 7: Close all applications, close the remote desktop session, then build the profile.
Step 8: Verify that EMET works by running samples which will trigger EMET. The following MD5 is for reference; Blue
Coat is unable to provide the samples, as they are malicisous. They are available on VirusTotal.
• C32AD4D6F6A00C85E6BD152852D5D09F (SimExecFlow, and StackPivot)
Return to the Add or Remove Programs window in the Windows 7 Control Panel (see Section 6 – Enhancing the
Windows 7 Profile, Step 2) and confirm that the following programs are now installed.
This configuration is the proper ending point for the base profile enhancement process.
Reminder: Microsoft .NET and Internet Explorer can be viewed from the Windows Features checklist in Windows 7.
Note Please contact your technical representative if your base profile configuration does not closely match
Figure 62. The versions do not need to be exactly the same as depicted below, as the vendors may post
newer versions online.
Step 1: Inside the Windows 8 virtual machine on the Desktop, click Desktop; the basic desktop appears.
Step 2: Navigate to the Control Panel.
Step 3: Inside the Control Panel, click Programs and Features.
Step 4: Inside the Programs and Features window, confirm that the following programs are currently installed.
This configuration is the proper starting point for the Windows 8 base image enhancement process.
Note Please contact your technical representative if your base image configuration does not closely match
Figure 63.
Figure 63 – Windows 8 Programs and Features displaying starting base image configuration
Step 4: Verify that Internet Explorer is installed and activated by clicking Turn Windows features on or off.
Click OK if you needed to turn Internet Explorer on, or click Cancel if it was already activated.
Step 4
Step 5: Click the Internet Explorer icon on the Windows 8 desktop or Taskbar to open the Web browser.
Note Sections 7.1 through 7.5 all take place through the Internet Explorer Web browser interface.
http://get.adobe.com/reader/
Click here to
accept the EULA
Launch Adobe Reader
from the Windows 8
Desktop
Step 2: When the installation is complete, run the Adobe Reader application from the Desktop and accept the
End User License Agreement (EULA). The EULA appears automatically upon the first launch of the application.
Note The IntelliVMs will be unable to utilize Adobe Reader properly until the EULA has been accepted.
Step 3: Turn off automatic updates. From the Edit menu, select Preferences.
Note Updates are valuable for improving security and beneficial for the malware detection process, however
it is essential that the MALWARE ANALYSIS APPLIANCE system administrator apply all updates
manually so as to maintain configuration control over the malware testbed at all times. If components
were to be allowed to update themselves automatically at random intervals, then configuration control
becomes impractical and the administrator is never quite sure what versions of which components are
being used for malware testing.
Select
Preferences from
the Edit Menu
Note EMET requires .NET 4.5. Install the correct version for your applications.
Click OK to
Figure 68 – Turn on Microsoft .NET Framework 3.5.1 or 4 from the Windows Features checklist commit the
change
Step 1: Download Microsoft Silverlight from this address and navigate the installer as required.
http://www.microsoft.com/silverlight/
Click here to
begin installation
Important Note
Disable the Silverlight auto update feature. See these documents for details:
• https://www.microsoft.com/getsilverlight/resources/documentation/grouppolicysettings.aspx#AutomaticUpdate
(HKEY_LOCAL_MACHINE\Software\Microsoft\Silverlight\UpdateMode = 2)
• https://www.microsoft.com/getsilverlight/resources/documentation/grouppolicysettings.aspx#TrustedApplications
(HKEY_LOCAL_MACHINE\Software\Microsoft\Silverlight\AllowInstallOfElevatedTrustApps = 1,
HKEY_LOCAL_MACHINE\Software\Microsoft\Silverlight\AllowLaunchOfElevatedTrustApps = 1)
6.11 Java
http://java.com/en/download/index.jsp
If you see the Uninstall out-of-date versions window, click Uninstall. The old version of Java will be uninstalled.
Click Next when required. When the new version has been installed, you will see the Java Setup – Complete
window. Click Close.
Step 2: New Java icons appear on the programs area of the desktop now. Click Configure Java.
Confirm
automatic
updates will
be disabled.
In the Malware Analysis appliance, the Microsoft® Enhanced Mitigation Experience Toolkit (EMET) detects unknown
exploits. For the InteliVM to be able to collect EMET events, EMET must be installed in a Windows 7 or 8 profile, and
properly configured. This feature is strongly recommended, but optional.
Note Blue Coat recommends that you first deploy EMET on a new profile to verify that it works as expected.
Step 1: Create a new Windows 8 profile. EMET is not supported on Windows XP.
Step 2: Customize the profile, then log on using RDP.
Step 3: Verify the .NET Framework 4.5 in installed on Windows; it is natively installed.
Note For EMET to work with Internet Explorer 10 on Windows 8, Microsoft KB 2790907 or a more recent
version of the Compatibility Update for Windows 8 must be installed.
Step 4: Download EMET 5.5 and the user-guide PDF from Microsoft at:
https://download.microsoft.com/download/8/E/E/8EEFD9FC-46B1-4A8B-9B5D-13B4365F8CA0/EMET%20Setup.msi ,
and begin the installation.
Step 5: On the EMET Configuration Wizard page, select Use Recommended Settings, and click Finish.
Step 6: Configure the EMET service to start automatically with no delay. Follow these steps:
4. Click Start, and search for “services.mscaudit only.
5. Right click the service name, and select Properties.
8. Click Apps in the upper menu bar to open the configuration window.
9. Set your Stop on Exploit preference.
• By default EMET is set to the Default Action Stop on exploit. This is the recommended setting for
maximizing detection. However, this may not give you all the details about the attack, including second stage
malware information. Blue Coat recommends maintaining this choice for maximum detection and with simpler
configurations.
• For full attack information (and a minimal reduction in exploit detection), select Audit only. This will let the
exploit continue as long as possible, only observing. This results in significantly more information about
consecutive stages of the attack.
10. Remove any applications you don’t want to monitor, if necessary. When the Use Recommended Settings
selection is made during installation, EMET adds and configures a set of popular applications. Click Remove
Selected when you have highlighted an application in order to remove it.
11. If necessary, add a new application, highlight it in the list, and enable all mitigations for that application (unless
otherwise advised).
Note Some mitigations are not compatible with certain applications. Blue Coat recommends referring
to the following link to verify your settings, and then to deselect any incompatible mitigations:
https://support.microsoft.com/kb/2909257.
B: Start the configured applications, then click Refresh in the EMET GUI, and verify you see a green check mark in the
Running EMET column.
Step 7: Close all applications, close the remote desktop session, then build the profile.
Step 8: Verify that EMET works by running samples which will trigger EMET. The following MD5 is for reference; Blue
Coat is unable to provide the samples, as they are malicisous. They are available on VirusTotal.
• C32AD4D6F6A00C85E6BD152852D5D09F (SimExecFlow, and StackPivot)
Return to the Add or Remove Programs window in the Windows 7 Control Panel (see Section 7 – Enhancing the
Windows 8 Profile, Step 2) and confirm that the following programs are now installed.
This configuration is the proper ending point for the base profile enhancement process.
Note Please contact your technical representative if your base profile configuration does not closely match
Figure 78. The versions do not need to be exactly the same as depicted below, as the vendors may post
newer versions online.
This section explains how to configure a custom Microsoft Office profile such that it detonates in the best possible way.
This procedure is specific for Windows 7, but the principles apply to all versions of Windows.
Steps Overview
These steps are performed from inside the iVM Profile on the Windows 7 virtual machine, using remote desktop protocol
(RDP). Adjust the security settings for each program to maximize the attack surface.
• Step 1: Configure Office
• Step 2: Configure Word
• Step 3: Configure MS Access
• Step 4: Configure Excel
• Step 5: Configure Publisher
• Step 6: Configure PowerPoint
• Step 7: Configure Outlook
• Step 8: Configure Windows Media Player
• Step 9: Configure Internet Explorer (v. 10+)
• Step 10: Configure Enhanced Mitigation Experience Toolkit (EMET)
Pre-Requisites
• Office 2010 installed
• EMET 5.5 installed
4. Close Word.
4. On the Trust Center window, select File Block Settings, and deselect everything.
5. On the Trust Center window, select Trusted Locations, and select Allow Trusted Locations on my network.
• Add C:\Users\Admin.
• Check Subfolders of this location are also trusted.
Figure 81 – Subfolders
6. On the Trust Center window, select Protected View, deselect Enable Data Execution Prevention mode, and
deselect everything else.
7. On the Trust Center window, select Add-ins, and deselect Require Application Add-ins to be signed by Trusted
Publisher.
8. On the Trust Center window, select Trusted Documents, and check Allow documents on a network to be
trusted.
9. On the Trust Center window, select Privacy Options, and deselect Check Microsoft Office documents that are
from or link to suspicious Web sites.
10. Close Word.
7. On the Trust Center window, select Add-ins, and deselect Require Application Add-ins to be signed by Trusted
Publisher.
8. On the Trust Center window, select Trusted Documents, and check Allow documents on a network to be
trusted.
9. On the Trust Center window, select Privacy Options, and deselect Check Microsoft Office documents that are
from or link to suspicious Web sites.
10. Close Access.
5. On the Trust Center window, select File Block Settings, and deselect everything.
6. On the Trust Center window, select Trusted Locations:
a. Add C:\Users\Admin.
b. Check Subfolders of this location are also trusted.
7. On the Trust Center window, select Add-ins, and deselect Require Application Add-ins to be signed by Trusted
Publisher.
8. On the Trust Center window, select Trusted Documents, and check Allow documents on a network to be
trusted.
9. On the Trust Center window, select Privacy Options, and deselect Check Microsoft Office documents that are
from or link to suspicious Web sites.
10. On the Trust Center window, select File Block Settings, and deselect all items in the File Type list.
11. Close Excel.
4. On the Trust Center window, select DEP Settings, and deselect Enable Data Execution Prevention Mode.
5. On the Trust Center window, select Add-ins, and deselect Require Application Add-ins to be signed by Trusted
Publisher.
6. Close Publisher.
4. On the Trust Center window, select Protected View, and deselect everything.
5. On the Trust Center window, select Trusted Locations, and select Allow Trusted Locations on my network.
• Add C:\Users\Admin.
• Check Subfolders of this location are also trusted.
6. On the Trust Center window, select File Block Settings, and deselect everything.
7. On the Trust Center window, select Add-ins, and deselect Require Application Add-ins to be signed by Trusted
Publisher.
8. On the Trust Center window, select Trusted Documents, and check Allow documents on a network to be
trusted.
9. On the Trust Center window, select Privacy Options, and deselect Check Microsoft Office documents that are
from or link to suspicious Web sites.
10. Close PowerPoint.
3. Optional. You may enable items on the Internet Properties window. To do so, select Security > Internet Zone >
Settings. The default settings should be fine.
4. Click OK to save your settings, and close the Control Panel.
• Verify that a batch file is written and that power shell commands are executed.
Related Documentation
• Installing EMET; see Error! Reference source not found..
• Macro configuration in Microsoft Office: https://support.office.com/en-us/article/Enable-or-disable-macros-in-
Office-documents-7b4fdd2e-174f-47e2-9611-9efe4f860b12
Copyright © 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue
Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may
be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising.
All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by
law. The information in this document is subject to change without notice.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION
CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMMANTEC CORPORATION
PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT
TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO
EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS,
REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY
LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN
COUNTRY OR IMPORT AFTER DELIVERY TO YOU.
Symantec Corporation
350 Ellis Street, Mountain View, CA 94043
www.symantec.com