SMT

Resource

Center

 

Coming Soon

Security Management Technology Center Develop Elearning, FAQ , New Center...

SMT BLOG

In the real life you can't have a medicine without going to the dr who will tell you to analyze your blood so he can know what type of infection you have then he can give you the right cure .

Malware analysis is one of the most important work in information security field , you may be the dr who will give the cure or the one who will analyze the system for the infection , today we will be the analyzer and the dr :D .

 

First How To Define The Symptoms For The Infection :

 As a Dr you will take a look at the systems and try to notice suspicious behavior like :

  1. Cpu work at 100% when no user programs are running.
  2. Icons on task bar for programs user didn't install.
  3. Network is always busy and everyone have slow connection .
  4. Unknown programs runs at startup .
  5. Document and files encrypted.
  6. Web pages open automatically on startup or when using the system.
  7. Messages sent without user interaction through skype or other messengers.
  8. Strange mouse motion like it controlled by someone.
  9. Applications won't start , some times another program run. 
  10. Browser Popups and ads in websites have no ads.

Second - How To Define The Infection Type :

After you noticed a suspicious behavior now you will search for a malware that have similar behavior .

to find this malware we must begin with a start point which may be :

  1. If the infection in browser we must get the name of the website that open as default page , search the plugins for suspicious plugins we didn't install .
  2. If the infection is a Desktop Popups , we must get the info displayed in these popups .
  3. If the infection in process that use 100% from cpu , we get the name of the process .
  4. If the infection in programs that show in taskbar , we get the name of this programs .
  5. If the infection is encryption of files , we get the extension of this encrypted files .
  6. If the infection is making the network slow , we get a capture of data transmitted to internet  ( how to explained later ) .

now we search google for these info , you must know that the malware infected you has a probability of 70% that is infected other users and the anti-malware company's caught him , so there is high probability that you will find the cause , name of malware , and the way to remove it .

Third - New Malware ? Lets Analyze And Make A Cure .

In malware analysis you must get a sample of the malware ( infection ) so you can isolate it from other programs and do your test in virtulized environment and gather info about what the malware can do and how to reverse and delete any record or infection done .

when you analyze malware you should know from where to gather information and what the locations malware usualy left a trace in it , as human body huge and complicated Operating systems also huge there is many location for malware to hide but there is a locations which malware must interact with in order to keep running in the system and to do its dirty work , so we must search in these location in order to analyze the malware right :

  1. watch every Folder or file open when malware run .
  2. Watch any edit on registry when malware run  .
  3. Watch any traffic out from network interface .

Drs have their own tools to analyze the microbics , as system Drs we have our own tools to analyze and gather even smallest information about the target malware .

from a various great tools we chosen those :

  1. Regshot : this tool can analyze the registry before and after the infection then compare them to get the difference which will be what the malware did .you can dowload it from here
  2. Process monitor : great  tool from microsoft that watch every process and get any small detail of the task did by this process .you can dowload it from here
  3. Dirwatch : this tool watch every attempt to read , write in any folder in the system .you can dowload it from here 
  4. Process Explorer : this tool from microsoft will give us all details about the running process . you can dowload it from here
  5. Wireshark : a great tool that will capture all the traffic out from network interface so we can analyze it later . you can dowload it from here

 

Now lets watch the video :

** Disclaimer **

Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Neither the creator is responsible for the comments posted on this website.

Newsletter

Subscribe to our newsletter and stay updated on the latest news and special offers!
Please wait