More example of tools usage and sample executable files.
Static analysis with CFF Explorer:
- General Information
- Check UPX
- Disable ASLR
- View Import Libraries
- Modify Hex
- Disassembly
- More...
Static Analysis with PE Studio:
- General Information
- Indicators of Malicious
- Check VirusTotal
- DOS and File Headers
- View Import Libraries
- Strings
- More...
Dynamic analysis with Process Explorer:
- DEP Status
- ASLR Enabled
- Verified Signature
- Virus Total
- Process Network
- TCP/IP
- More...
Dynamic analysis with Process Hacker:
- DEP Status
- ASLR Enabled
- Verified Signature
- Service
- Network
- More...
Dynamic analysis with Autoruns:
- One of the best tool for infected machine
- Task Scheduler
- Services
- WMI
- More...
Dynamic analysis with Sandbox, BSA and Wireshark:
- Notice the new process, file, registry, import libraries and more...
Dynamic analysis with Regshot:
- Differentiate the before and after execution of malicious program/ script in registry
Sample executable files:
Give a try on the sample executable files.
- What are the libraries called when create file, write new registry and network access?
- Is the executable file packed?
- What is the new created file name?
- What is the new created registry key and value?
- What is the connection made?
End of Just another Malware Analysis Guide (3) - Tools and Samples
No comments:
Post a Comment