Fin - MW - RP - Phan Van Quy
Fin - MW - RP - Phan Van Quy
I - Introduction:
PEStudio emerges as a versatile disassembly tool tailored for the analysis of Windows
executable files. Its capabilities extend to scrutinizing Portable Executable (PE) files,
providing a comprehensive array of insights, including imports, exports, sections, and
resources. This tool proves invaluable in the static analysis phase, allowing analysts to
identify key indicators of malicious activity before execution.
Detect It Easy is a lightweight yet potent tool designed for file signature analysis. By
scrutinizing file headers and structures, DiE aids analysts in determining file types and
characteristics. This tool is particularly adept at identifying packed or obfuscated binaries, a
crucial aspect of malware analysis aimed at uncovering evasion techniques.
The selection of PEStudio, Detect It Easy, and Procmon over alternative tools is grounded in
their unique strengths and complementary functionalities. PEStudio's robust analysis of PE
files offers a detailed static perspective, laying the foundation for subsequent analysis
phases. Detect It Easy's specialization in file signature analysis provides crucial insights into
the presence of packed or obfuscated code, contributing to a more nuanced understanding
of evasion techniques. Finally, Procmon's real-time monitoring capabilities enhance dynamic
analysis, allowing analysts to witness and interpret the actual behavior of malware within a
controlled environment.
IV - Utilising tools functions with Lab 3-1 & 3-2 application practice:
Application overview:
-> In lab 3-1, students typically use PEStudio to analyze a malware sample. The tool assists
in identifying suspicious or malicious indicators, including abnormal imports, code sections,
and resource allocations. Analysts can leverage PEStudio to understand the potential impact
of the malware on the system.
-> In lab 3-2, students commonly use Detect It Easy to uncover the file signatures of different
malware samples. DiE helps analysts recognize the type of packer or obfuscation used,
providing valuable insights into the malware's evasion techniques. This information is crucial
for developing effective countermeasures.
-> Both lab exercises 3-1 and 3-2 involve the use of Procmon to perform dynamic analysis
on malware samples. Analysts can observe the behavior of the malware in a controlled
environment, helping to understand its impact on the system and potential mitigation
strategies.
Lab 3-1: Analyze the malware found in the file Lab03-1.exe using basic
dynamic analysis tools.
In need for accelerate the initial assesment, Pestudio is used to analyse the executable file.
-> The malware creates a synchronization primitive called a "mutex" (mutual exclusion)
named "WinVMX32." A mutex is often used by malware to ensure that only one instance of
itself is running on the system at any given time.
-> The malware copies itself to a specific location on the host system: ‘C:\Windows\
System32\vmx32to64.exe’. This is the file path where the malware duplicates its executable.
Student in charge: Phan Van Quy
-> The malware configures itself to run automatically when the system starts up. It achieves
this by making changes in the Windows Registry, a centralized database that stores
configuration settings for the Windows operating system.
-> As a result, when the system starts, the malware will be executed automatically because
it has added an entry in the registry indicating that it should run on startup.
Question 3: Are there any useful network-based signatures for this malware? if
so, what are they?
Lab 3-2: Analyze the malware found in the file Lab03-02.dll using basic
dynamic analysis tools.
-> Use rundll32.exe with rundll32.exe Lab03-02.dll,installA to run the malware's exported
installA function in order to install it as a service.
Student in charge: Phan Van Quy
Question 2: How would you get this malware to run after installation?
-> After the malware has been installed, we can observe the addition of a new service called
IPRIP registry. We can either run it through net utility or SC Tool:
- “net start IPRIP”
- “sc start IPRIP”
Question 3: How can you find the process under which this malware is
running?
-> Determine which process is executing the service by using Process Explorer.
We can click on Find in Process Explorer, enter the name of the DLL, and obtain the details
of the malware's operating system.
Question 4: Which filters could you set in order to use procmon to glean
information?
-> You can use Process Explorer to find the PID and then use Procmon to filter on it.
Student in charge: Phan Van Quy
-> The malware installs a service called IPRIP, displays name of Intranet Network
Awareness (INA+) along with the description “Depends INA+, Collects and stores network
configuration and location information , and notifies applications when this information
changes.”
It writes to HKLM\SYSTEM\ControlSet001\Services\IPRIP\Parameters\ServiceDll:
%CurrentDirectory%\Lab03–02.dll in the registry for persistence.
Question 6: Are there any useful network-based signatures for this malware?
-> The malware resolves the domain name practicalmalwareanalysis.com and establishes
an HTTP-like connection with that host via port 80.
It uses the User-Agent %ComputerName% and makes a GET request for serve.html.
Microsoft Windows XP 6.11.
Student in charge: Phan Van Quy
V - Conclusion:
In conclusion, the fusion of PEStudio, Detect It Easy, and Procmon forms a potent
disassembly toolkit, fostering a holistic approach to malware analysis. PEStudio excels in
static analysis, identifying threats based on file attributes, while Detect It Easy unveils file
signatures, exposing packing and obfuscation techniques. Procmon facilitates dynamic
analysis, enabling real-time observation of malware behavior. This synergy equips
cybersecurity professionals with a robust skill set, honed through hands-on experience in lab
exercises 3-1 and 3-2. This integrated approach enhances threat identification accuracy and
provides a nuanced understanding of modern malware tactics, strengthening overall
cybersecurity practices.