mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-24 09:24:20 +01:00
updating static
This commit is contained in:
38
static.md
38
static.md
@@ -7,4 +7,42 @@ title: Static Analysis
|
||||
|
||||
# Section 5: Static Analysis #
|
||||
|
||||
## LAB 1
|
||||
|
||||
### Possible Packer?
|
||||
Notice in CFF explorer that there is UPX in the header.
|
||||

|
||||
|
||||
When you open the executable in IDA, you will notice large section of non-disassembled code.
|
||||

|
||||
|
||||
Because UPX is a common packer, the unpacker is already built in to CFF Explorer. Unpack and save the file with a name that identifies it as unpacked.
|
||||

|
||||
|
||||
### Reopen the executable in IDA.
|
||||
|
||||
The next step is getting a sense as to what the program is doing.
|
||||
So far we can assume:
|
||||
* This exe is connecting to the internet somehow
|
||||
* This exe is using a string encryption function
|
||||
* This exe might be spawning a shell
|
||||
|
||||
---
|
||||
|
||||
Navigate to the **String** window.
|
||||
|
||||
Here is an interesting string that we should start with:
|
||||

|
||||
|
||||
Using the **X** key we can jump to the reference of that string in the assembly code.
|
||||

|
||||
|
||||
This function is offset **00401340**. Notice in that function is setting a registry key using Window API [RegOpenKeyEx](https://msdn.microsoft.com/en-us/library/windows/desktop/ms724897%28v=vs.85%29.aspx?f=255&MSPPError=-2147217396).
|
||||
|
||||
We should rename this function **SetRegkey**.
|
||||
|
||||
---
|
||||
|
||||
|
||||
|
||||
[Section 4 <- Back](https://securedorg.github.io/RE101/section4) | [Next -> Section 6](https://securedorg.github.io/RE101/section6)
|
||||
|
||||
Reference in New Issue
Block a user