当前位置:网站首页>Malicious code analysis practice - lab03-01 Exe basic dynamic analysis
Malicious code analysis practice - lab03-01 Exe basic dynamic analysis
2022-06-12 10:33:00 【Bng!】
Malicious code analysis practice ——Lab03-01.exe Basic dynamic analysis
1. The experiment purpose
Comprehensive use of various analytical tools , analysis Lab03-01.exe Basic information of , And speculate its function .
2. Experimental environment ( Hardware 、 Software )
VMware virtual machine (winxp):
Hardware : processor Intel Core i5-10210U CPU @ 1.60GHz 2.11 GHz
Software :32 Bit operating system
kali virtual machine
3. The experimental steps ( Describe the operation process in detail , The key analysis needs to be attached with screenshots )
(1) Static analysis
①MD5 value

②peid analysis

You can see Lab03-01.exe Has been shelled
③strings analysis
strings Lab03-01.exe


Found some registry information and a exe File and a possible domain name
Guess analysis may visit the website to download some Trojan files through the connection, or through vmx32to64.exe Download open some back doors ,, Therefore, the dynamic analysis focuses on the addition and deletion of registry modification information and files, as well as networking operations
(2) dynamic analysis
①regshot Registry analysis
Regshot Run after the first snapshot Lab03-01.exe
function Lab03-01.exe Record the second snapshot after 
Click on compare After comparing the registry information twice, it is found that the new registry key value 
Found in the self start item VideoDriver Key value is added in 43 3A 5C 57 49 4E 44 4F 57 53 5C 73 79 73 74 65 6D 33 32 5C 76 6D 78 33 32 74 6F 36 34 2E 65 78 65, Replace it with the characters C:\WINDOWS\system32\vmx32to64.exe, explain VideoDriver The self starting item points to system32 In the catalog vmx32to64.exe
②process explorer analysis
open explorer The lower window of the DLLs Dynamic link library

function Lab03-01.exe After the discovery 
stay Lab03-01.exe in ws2_32.dll and wshtcpip.dll Therefore, it indicates that there are network operations
③process monitor analysis
Get into Filter Add filter criteria to the window 

It was predicted that the program would be downloaded during the previous static analysis vmx32to64.exe file , Gu Zai run Lab03-01.exe Can after ctrl+F Search directly vmx32to64.exe after 
Found in windows\system32 Create a write under the path vmx32to64.exe File and in currentversion\run I created VideoDriver Key value of self starting item
Came to windows\system32 View under directory vmx32to64 file


View its MD5 Value found to be the same as Lab03-01.exe equally , So come to the conclusion Lab03-01.exe Copy yourself to windows\system32 Under the table of contents , In the above registry analysis VideoDriver The key value of the self starting item points to windows\system32 The next path vmx32to64.exe
④ApateDNS Network access analysis

Found that it visited www.practicalmalwareanalysis.com This web site
ApateDNS Refer to the article for virtual network configuration 《 Malicious code analysis practice —— Use Apatedns and Inetsim Simulate the network environment 》
4. The experimental conclusion
Lab03-01.exe To copy itself to system32 Under the table of contents , And start up automatically
And Lab03-01.exe Run to make access www.practicalmalwareanalysis.com website
边栏推荐
- 93. 获得内网的所有IP地址
- The name of a great man
- 远程桌面不能复制粘贴解决办法
- Properties Chinese garbled code
- Halcon combined with C # to detect surface defects -- affine transformation (III)
- 淘宝618超级喵运会怎么玩?超级喵运会整体活动攻略来了
- PHP wechat red packet allocation logic
- How to refund the pre-sale deposit of JD 618 in 2022? Can JD 618 deposit be refunded?
- Machine learning is not something you can use if you want to use it
- Summary method of lamp environment deployment
猜你喜欢

A hundred secrets and a few secrets - Caesar encryption

Code types and data structures corresponding to the five object types of redis

Circuitbreaker fuse of resilience4j - circuitbreakerregistry register

蓝桥杯2015年CA省赛(填坑中)

2022淘宝618超级喵运会玩法攻略 618超级喵运会玩法技巧
![[Wayland] Wayland introduction and customized guidance](/img/4e/655d484ca7787f39aab446fdb1ae74.jpg)
[Wayland] Wayland introduction and customized guidance

2022 Taobao 618 Super Cat Games introduction 618 super cat games playing skills
![[experiment] MySQL master-slave replication and read-write separation](/img/aa/7d0799013ff749cacf44ba3b773dff.png)
[experiment] MySQL master-slave replication and read-write separation

学生管理系统

验收标准到底是不是测试用例?
随机推荐
Add jar package under idea2018 web project
Dynamic proxy
Timers in golang
CONDA install tensorflow test tensorflow
在App内跳转微信,打开微信
Amélioration de la 3dsc par HSC
[MySQL] learn more about the clustered indexes and auxiliary indexes (b+ tree indexes) in InnoDB
Mobile terminal commissioning
How to play the 2022 Taobao 618 Super Cat Games? What are the strategies for the Super Cat Games
A hundred secrets and a few secrets - Caesar encryption
JS scale down the width and height of the picture
Download Notepad++
Love and hate in the Jianghu
使用cpolar远程办公(2)
Error during session start; please check your PHP and/or webserver log file and configure your PHP
[Wayland] Wayland introduction and customized guidance
Golang start service background daemon
PHP wechat payment V3 interface
Mqtt protocol Chinese version
学生管理系统