Table of Contents

Lab01. Malware sample analysis

Objectives

Topology

For this exercise you will need a Windows 10 virtual machine.

Tasks

01. [5p] Virtual machine setup

If your VM networking is connected to your computer network, your computer might get infected during this lab activity. Create a snapshot for the VM before you continue.

Open the Windows 10 virtual machine and make sure that it is not connected to the local network and it does have Internet access via NAT interface (not bridged). Turn off your Windows defender protection (Windows Settings→Update & Security→Windows Security→Virus & threat protection→Virus & threat protection Settings→Turn off Real-time protection).

02. [5p] Lab setup

Download the lab setup files from the assistant. Install the programs and extract the sample files.

The sample archive contain one malware and uses the “malware” password.

03. [10p] Initial file analysis

Your network administrator has provided you with 10 files that look suspicious and where caught by the network security equipment. Your job is to determine if there is any suspicious file and find out as much information about it as possible. Fill in the following data for each file. Try to do this using a (PowerShell) script.

Filename Type of file (EXE,DLL,etc.) Original filename Date modified MD5 hash
- - - - -

04. [5p] File compare

Is the previous information enough? Does it really help? Use the WinMergePortable.exe program and compare “test1.exe” against “test2.exe”. What about their hashes, how close are them? Consider the file properties and spot the differences.

05. [15p] Behaviour analysis

Sometimes this malware versions needs a second re-execution just to speed it up. Do not restart your computer.

Find out which of the files are executables and start them. Observe their behavior.

Revert to the previously created snapshot and re-open the VM.

06. [10p] Malware network activity monitoring

In this exercise you will monitor the network connections of the malware. Start Wireshark before running the malware and save the captures. You can copy/paste the pcap file outside the VM and analyze it. Please write down the followings:

07. [5p] Active connections

For a proper analysis of the malware traffic you can use the netstat tool to view all active connection. It helps to narrow down the traffic from a specific process. Open it before running the application and see the outgoing connections. You can also use TcpLogView to save the data in a readable format.

08. [10p] Windows registry activity analysis

Besides network access, a malware will try to make itself hard to find and to remove, adding different registry entries. Use the Procmon tool to monitor the entries in the registers done by the malware.

09. [10p] File creation monitoring

Use the previous data saved (or re-run the procmon tool) and look at the files created and opened by the malware.

10. [5p] Malware morphing

Modify the malware using the ResourceHacker tool (e.g., version number) and make sure that that hashes changes. Enable the Windows Defender Virus and Threat Defender. See if it can find the old executable as malware, what about the new one?

11. [10p] Threat intelligence

For more information of the malware please search for the hash on “https://www.virustotal.com”. What about the new hash, did the virustotal website find it? You can also upload the new file and see the results. Try to see if you can also spot other types of behavior that the malware does in the security report provided.

12. [10p] Threat hunting

The selected malware uses bitcoin as a payment alternative. Investigate how much money did they earned.