Dynamic Malware Analysis
Dynamic Malware Analysis
❖ Process Hacker
❖ Process Explorer (SysInternals)
❖ Procmon (SysInternals)
❖ Sysmon
4-Registry Activities
Registries are hierarchical databases that are used for data storage in Windows operating
systems. It is used by attackers for purposes such as stealing data and ensuring persistence.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
Steps you should follow after running the malware!
❖ Process Activities
❖ Network Activities
❖ Registry Activities
❖ File Activities
%TEMP%
Shell: startup
Shell: common startup
Preparing
1. Process Hacker to see the processing activity and the processes belonging to the
malware.
2.
The malware runs under the explorer process now; we need more details to understand
the malware. I will use procmon to understand the tree of the process.
Procmon
Make sure to press the "Show Process Tree" button in the top menu,
procmon will show the process tree it has created for you during the time it
has recorded
As we see, the Malware (727ef..) PID=3716 runs the tool called “schtasks.exe” belonging to
Windows Task Scheduler (PID 1388) and then runs its own malware (3768 PID) again.
Now we need to examine the schtasks.
we see that a scheduled task named "Updates\VbxFiQYCyFDgGL" has been created. However,
the information of the scheduled task except for its name is in the XML file located at the
following path:
“C:\Users\Amanda\AppData\Local\Temp\tmpCCF2.tmp”.
You can see what action will run on the Actions tab. You can see on the above screenshot that
the malicious software named “VbxFiQYCyFDgGL.exe” prepared by the attacker will run when
this scheduled task runs.
We detected malware processes (3716-1388-3768 PIDs)
Network Activities
After running the malware, you can see that the process named “722ef401….” on Fiddler
communicates with the domain “5gw4d[.]xyz”.
File Activities
Now we need to know the file activities and if there is a new drop file.
You can enter a filter with Operation=CreateFile to see file creation activities.
When we examine the logs, we see that an executable file named "VbxFiQYCyFDgGL.exe" is
written under the "C:\Users\Amanda\AppData\Roaming\" directory.
When we examine the file activities further, we see that the malware reads the files to steal
information from applications such as Firefox, Chome, Thunderbird. We have determined that
the malware we have is information stealer.
Another Malware analysis
Registry Activities
Network activities
You can access this directory by pressing the “Win + R” key combination and typing the
following command afterward:
%TEMP%
shell:startup
shell:common startup