updating static
@@ -5,4 +5,6 @@ title: Dynamic Analysis
|
|||||||
---
|
---
|
||||||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||||||
|
|
||||||
# Section 4: Dynamic Analysis #
|
# Section 6: Dynamic Analysis #
|
||||||
|
|
||||||
|
[Section 5 <- Back](https://securedorg.github.io/RE101/section5)
|
||||||
BIN
images/static1.png
Normal file
|
After Width: | Height: | Size: 18 KiB |
BIN
images/static2.gif
Normal file
|
After Width: | Height: | Size: 152 KiB |
BIN
images/triage1.png
Normal file
|
After Width: | Height: | Size: 59 KiB |
BIN
images/triage2.png
Normal file
|
After Width: | Height: | Size: 69 KiB |
BIN
images/triage3.png
Normal file
|
After Width: | Height: | Size: 67 KiB |
BIN
images/triage4.png
Normal file
|
After Width: | Height: | Size: 98 KiB |
BIN
images/triage5.png
Normal file
|
After Width: | Height: | Size: 56 KiB |
38
static.md
@@ -7,4 +7,42 @@ title: Static Analysis
|
|||||||
|
|
||||||
# Section 5: Static Analysis #
|
# Section 5: Static Analysis #
|
||||||
|
|
||||||
|
## LAB 1
|
||||||
|
|
||||||
|
### Possible Packer?
|
||||||
|
Notice in CFF explorer that there is UPX in the header.
|
||||||
|

|
||||||
|
|
||||||
|
When you open the executable in IDA, you will notice large section of non-disassembled code.
|
||||||
|

|
||||||
|
|
||||||
|
Because UPX is a common packer, the unpacker is already built in to CFF Explorer. Unpack and save the file with a name that identifies it as unpacked.
|
||||||
|

|
||||||
|
|
||||||
|
### Reopen the executable in IDA.
|
||||||
|
|
||||||
|
The next step is getting a sense as to what the program is doing.
|
||||||
|
So far we can assume:
|
||||||
|
* This exe is connecting to the internet somehow
|
||||||
|
* This exe is using a string encryption function
|
||||||
|
* This exe might be spawning a shell
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Navigate to the **String** window.
|
||||||
|
|
||||||
|
Here is an interesting string that we should start with:
|
||||||
|

|
||||||
|
|
||||||
|
Using the **X** key we can jump to the reference of that string in the assembly code.
|
||||||
|

|
||||||
|
|
||||||
|
This function is offset **00401340**. Notice in that function is setting a registry key using Window API [RegOpenKeyEx](https://msdn.microsoft.com/en-us/library/windows/desktop/ms724897%28v=vs.85%29.aspx?f=255&MSPPError=-2147217396).
|
||||||
|
|
||||||
|
We should rename this function **SetRegkey**.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
[Section 4 <- Back](https://securedorg.github.io/RE101/section4) | [Next -> Section 6](https://securedorg.github.io/RE101/section6)
|
[Section 4 <- Back](https://securedorg.github.io/RE101/section4) | [Next -> Section 6](https://securedorg.github.io/RE101/section6)
|
||||||
|
|||||||
@@ -77,8 +77,10 @@ You can use the **Malware Analysis Report** template [HERE](https://securedorg.g
|
|||||||
2. Copy over the unknown file
|
2. Copy over the unknown file
|
||||||
3. Check the file header by opening the file in the hex editor **HxD**
|
3. Check the file header by opening the file in the hex editor **HxD**
|
||||||
* Notice the first 1 byte is **MZ** meaning it's a PE Binary
|
* Notice the first 1 byte is **MZ** meaning it's a PE Binary
|
||||||
|

|
||||||
4. Now right click the file and select **CFF explorer** to check the PE header
|
4. Now right click the file and select **CFF explorer** to check the PE header
|
||||||
* Note the imports it's using
|
* Note the imports it's using
|
||||||
|

|
||||||
5. Calculate the hash using **quickhash**, go to virustotal.com and search the hash
|
5. Calculate the hash using **quickhash**, go to virustotal.com and search the hash
|
||||||
6. Open the file in **BinText** and record any interesting strings
|
6. Open the file in **BinText** and record any interesting strings
|
||||||
|
|
||||||
|
|||||||