Practical malware analysis 1 - 4 | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!

Practical malware analysis 1 - 4

Practical malware analysis 1 - 4

LV
0
 

dax050

Member
Joined
Sep 23, 2023
Threads
10
Likes
3
Awards
2
Credits
463©
Cash
0$
This is the last lab in the first chapter “BASIC STATIC TECHNIQUES”.
16hsZUxU 5VBsz3bxLijI9w

The lab file is Lab01–04.exe, let’s start to analyze it and answering the following questions to see what it hides:
  1. Upload the Lab01–04.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions?
  2. Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible.
  3. When was this program compiled?
  4. Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
  5. What host- or network-based indicators could be used to identify this malware on infected machines?
  6. This file has one resource in the resource section. Use Resource Hacker to examine that resource, and then use it to extract the resource. What can you learn from the resource?
So, let’s start.

Question 1​

Upload the Lab01–04.exe file to http://www.VirusTotal.com/. Does it match
any existing antivirus definitions?

Answer:​

Virus Total tell us that the file is detected by 59 out of 71 vendors.
1HtSDHWNvYZXG9V0Tb1HGNg

Lab01–04.exe on VirusTotal

Question 2​

Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible.

Answer:​

By using Exeinfo PE, it says that the file is not packed, and is compiled by Microsoft Visual C++.
1m7uQtF8fhjY0 RYi1tPWtQ

we also take a look at the strings and imports we see a lot, so obviously the file is not packed or obfuscated.
1jowOzE1wJn75219zQc0lLg


Question 3​

When was this program compiled?

Answer:​

We can answer this question with PEStudio but let’s try another tool.
by PEview we see that the compile date is 30/8/2019, and this is fake because the book was published in February 2012.
14j2aBNfPiOD mJfBk9WWPg


Question 4​

Do any imports hint at this program’s functionality? If so, which imports are they and what do they tell you?
there are functions like, WriteFile, CreateFileA, MoveFileA,
so, I guess that the file is doing actions on the disk and files,
and there another function called WinExec, then the files that the exe creates and writes will be executed.
1wkrhNp12ZTzDEWrITyxi9w

kernel32.dll imports.
we also see AdjustTokenPrivileges, LookupPrivilegeValueA, and it may be enables the exe to get higher privileges.
1UpIBMfZOh4MS5lGbnFeHhQ

advapi32.dll imports.

Question 5​

What host- or network-based indicators could be used to identify this malware on infected machines?
we go to BinText to view the strings, and we see a lot in there, a function called URLDownloadToFile.
1WF9BpJA7Rq8RFwVUpEdA Q

This function downloads a file from the Internet to a local file quickly and easily. so obviously it downloads a file but, from where it will download it? and in which fill it will put?
fortunately, there are other strings that answer our questions, i found a URL that we will use as a network-indicator “http://practicalmalwareanalysis.com/updater.exe”
and a path which the malware will put the downloaded file in it “\system32\wupdmrgd.exe
17qmiGPT4H4k7AW3p6NUu7g


Question 6​

This file has one resource in the resource section. Use Resource Hacker to examine that resource, and then use it to extract the resource. What can you learn from the resource?

Answer:​

using resource hacker, we save it as a binary file.
1T6O8WMB A8KHLAbaP7F61Q

and in the binary file we get more information about the file, and we can see more imports and the original compile time.
1KYFgLxXBiIpEdlKFi5Dlqw


We have finished solving the lab of the first chapter, I recommend you guys to download the tools and try solving the lab with yourselves,

The Second chapter has no labs it just teaches you how to setup your safe environment, it’s very important for you to not harm your personal machine, be safe.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom