Analyse a given sample of malware

Assignment Help Computer Engineering
Reference no: EM133109407

Cyber Crime Malware

Static & Dynamic Malware Analysis

Introduction
The aim of this assessment is to analyse a given sample of malware, using static & dynamic analysis methods and write a detailed report. The sample is available on Moodle in zip format (password: infected).

Report
You are required to document the complete analysis of the sample. You can break it down into two main areas, i.e., static and dynamic analysis. You could have sub-sections in these areas, e.g., in dynamic analysis you can have file system, registry, and network activities as separate sections. For each section, you should list the tools you used (bullet points). Also, if the tools used require specific configuration, briefly explain what you did and give reasons for this. For example, in Process Monitor, you could mention the filters you applied (and why) to monitor specific processes.

- Static Analysis: A thorough investigation of the suspect binary in a non-running state. You must document all steps clearly.

- Dynamic Analysis: Running the malware in a virtual machine. Make sure that you have made a clean baseline snapshot (with all tools installed and configured), before you run the malware. Use the tools to monitor the malware's behaviour in the file system, registry, and network. Report on your findings.

Attachment:- Cyber Crime Malware.rar

Reference no: EM133109407

Questions Cloud

Explain atkinson flexible firm model : Please explain Atkinson flexible firm model short and clear with evidence and citation . Please help to add on Singapore Deliveroo with citation and evidence
Prepare the journal entry to adjust interest expense : Amount owing in the accounts payable ledger was $5,000. Prepare the journal entry to adjust interest expense as at 30 June 2022
Systems perspective of employment relations : In terms of the systems perspective of employment relations is the following viewed as system outputs.
Construct a sequence of logical reasons : Message Strategies: Proposals [LO-7] Think of a course you would love to see added to the curriculum at your school. Conversely, if you would like to see a cour
Analyse a given sample of malware : Analyse a given sample of malware, using static & dynamic analysis methods and write a detailed report - thorough investigation of the suspect binary
Examples of closed-ended questions : What are some examples of closed-ended questions and why would we use those?
Prepare journal entries to record all the transactions : The building will be depreciated using the straight-line method of depreciation. Prepare journal entries to record all the transactions of JFG Ltd
Developing a job description for position : Participate in the class discussion exercise on the following topic: Your neighbor, who has just retired from the military in the security field (Military Polic
Provide recommendation to resolve the issue : Provide recommendation(s) to resolve the issue(s). Explain why your suggestions will help the company to resolve the issue(s).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd