Chapter Eight and Nine focused on dynamic analysis of programs. Once the basics were out of the way in Chapter eight, we shifted focus to using OllyDbg to fulfil our dynamic analysis objectives. Let’s get to solving problems from this chapter!
Exercise 1 Hash Name b94af4a4d4af6eac81fc135abda1c40c Lab09-01.exe d6356b2c6f8d29f8626062b5aefb13b7fc744d54 Lab09-01.exe 6ac06dfa543dca43327d55a61d0aaed25f3c90cce791e0555e3e306d47107859 Lab09-01.exe Preface: Analyze the malware found in the file Lab09-01....
Chapter Seven focused on analyzing programs which are designed to run on the Windows operating system and make use of the Windows API exposed to developers to interact with the system, its kernel, and other resources available to the user.
Exercise 1 Hash Name c04fd8d9198095192e7d55345966da2e Lab07-01.exe 86ee262230cbf6f099b6086089da9eb9075b4521 Lab07-01.exe 0c98769e42b364711c478226ef199bfbba90db80175eb1b8cd565aa694c09852 Lab07-01.exe Analyze the malware found in the file Lab07-01....
Chapter Six focused on code constructs and how analysts can easily identify them when walking through the disassembly in IDA. Let’s take a look at the exercises now.
Exercise 1 Hash Name 6abde2f83015f066385d27cff6143c44 Lab06-01.exe 536e6f91d4515e30af7afd37f22c213fee152126 Lab06-01.exe fe30f280b1d0a5e9cef3324c2e8677f55a6202599d489170ece125f3cd843a03 Lab06-01.exe Question Number 1: What is the major code construct found in the only subroutine called by main? Let’s get to work....
Let’s kick it off. The first chapter of PMA was an introduction to Basic Static Analysis. Although there’s a unique set of tools used in the book, I’d be improvising and testing other tools which might achieve the same purpose.
Tooling I’ll be using the following tools/services for this chapter: [I’m diverting from the toolset used by the author… mainly because they’re outdated]
PEStudio PEView PEID ExeInfoPE VirusTotal Exercise 1 Hash Filename BB7425B82141A1C0F7D60E5106676BB1 Lab01-01....
Previously, we covered Basic Static Analysis and Basic Dynamic Analysis in Chapter 1 and 3 of Practical Malware Analysis. That marks an end to the first part of the book.
The fourth chapter kicks off the second part of the book and takes a slight detour to cover one of the most important pre-requisites to perform malware analysis; assembly language. However, the crash course doesn’t have any exercises. It’s why we’ll be proceeding to exercises of the fifth chapter i....