The premise of this project is to demonstrate my knowledge in implementing countermeasures to protect information systems against malicious software (malware) attacks. Moreover, this project will include 4 different reports and each will be on a broad range of topics which will be displayed through static and dynamic analysis. The final reports will be linked in the References section.
Note: This project is part of the Malicious Code: Design & Defense course in which I received a combined final grade of 98.75% for these practicals.
- Windows 10 ISO
- Oracle VM VirtualBox
- Windows 7 ISO
Note: Some tools used in Report 1 was also used for this report.
Please refer to report 1 in the references section for an in-depth information as it is a multi-step process.
Please refer to report 2 in the references section for an in-depth information as it is a multi-step process.
Please refer to report 3 in the references section for an in-depth information as it is a multi-step process.
Please refer to report 4 in the references section an for in-depth information as it is a multi-step process.
- Perform basic Static Analysis on the given malware samples.
- Use tools discussed during lectures such as but not limited to, PEiD, TriDNet, HashMyFiles, CFF Explorer, BinText, Notepad++, etc.
- Understand malware naming schemes and be able to figure out the malware type, platform it infects, malware family name and group name.
- Be able to document and cite using IEEE and APA.
- Be able to detect if a malware has a code signing certificate.
- Utilize tools that analyze malware statically and dynamically.
- Be able to determine a malwares type, format, packed or unpacked, entropy, etc.
- Be able to use API Miner and observer what kind of API calls were made during execution (Log observations).
- Be able to explain the type of family, attributes and artifacts of the malware.
- Be able to dynamically observe the strings of the malware.
- Use tools such as ProcMon to observer changes within the system.
- Understand the usage of OllyDbg & IDA Pro.
- Inspect and devise malicious code by inspecting assembly language.
- Understand how malware achieve persistence through analysis of assembly code.
- Be able to perform advance dynamic analysis (running the code) with OllyDbg or IDA pro.
- Able to set breakpoints and step through, over and into assembly code.
- Able to read and follow assembly code register and be able to understand what is happening.