What are the samples runtime dependencies

Assignment Help Computer Engineering
Reference no: EM132161976

Malware Investigation

The learning outcomes that are assessed by this coursework are:
1. Identify and analyze malware using appropriate procedures, tools and techniques
2. Interpret and communicate the significance of malware behavior to decision makers
3. Distinguish and critically compare malware delivery and spreading techniques
4. Assess and synthesize the likely impact of a malware infection from its binary

Tasks to be undertaken:

In this coursework, you are expected to:

Analyze two specimens of malware and write a report answering set of questions about the insights gained and detailing your approach with relevant evidence (e.g. screenshots, excerpts of logs, etc.)

Part 1: Basic malware analysis

Scenario and goal

This is part 1 of the graded exercise. It is worth 50% of your total grade. Every question is worth 5 points, for an exercise total of 50.

In this scenario, an acquaintance was e-mailed a suspicious attachment and wants to know if it is malicious. He already opened the file and was surprised to see a foreign-language sentence. Now he is concerned that he is infected with malware.

Answer all the questions below and write a full report. If you want to work in pairs, identify both authors on the report cover sheet and upload it twice.

Environment & tools
Statically and dynamically analyze the unzipped sample "29-10-2014_Quittung.rtf" on a Windows XP SP3 virtual machine. The archive password is "infected". Please note that this is real malware.

Which tools to use is completely up to you. In malware analysis, there is rarely only one "right" path. Be creative! Still, I suggest you look at previous exercises and pick whatever tools you deem appropriate.

For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise "Combined dynamic analysis") and determine beforehand if it is safe.

Analysis tasks

1. What type of attack is being used to entice the victims to click on the attachment? By translating the message, can you explain how the victims are baited to click on the attachment?

2. Your friend has already opened the document attachment. What happened? Is his machine already infected? Find proof for/Argue your answer! (hint: open the document while monitoring with regshot, process explorer or process monitor)

3. Extract the core malware and document the steps.

4. Perform a basic static analysis of the sample and document your findings. Is it packed? What do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting strings? Remember: MSDN is your friend! (hint: PEiD, PEview, Mitec Exe explorer, Resource Hacker etc.)

5. Analyze the sample dynamically and monitor the activity on the system. What changes? Is anything dropped, executed or deleted? If you use Regshot, be careful to set the right scan directory (C:)! (hint: require outputs from regshot, process explorer, process monitor)

6. Can you find indicators for sandbox or VM detection? What can you do to circumvent it? Restart your analysis after taking care of the anti-analysis technique(s).

7. Try to find out what the sample is about to do network-wise and set up an appropriate fake environment. What is happening? (hint: wireshark, fakenet etc.)

8. What are the sample's runtime dependencies? What is it trying to download? Try to play along and set up the environment it wants and determine what the malware needs the additional software for.

9. Extract and document all relevant IP addresses that are or might be contacted (static and dynamic analysis) and determine domain ownership.

10. If you satisfied all the sample's requirements (i.e. installed all the components it needs) the malware will alter your system's configuration. What is happening? Hint: Certificates.

Part 2: Ransomware disassembly

Scenario and goal

This is part 2 of the graded exercise. It is worth 50% of your total grade. Every question is worth 5 points, for an exercise total of 50.

In this scenario, your company's CFO was victim of a crypto locker, losing all her precious holiday photos. She comes to you in hopes that you'll be able to help her recover her files without paying the ransom. The incident response team has already located the malicious sample and provides you with both the malware and an encrypted sample that needs to be recovered at all costs.

Answer all the questions below and write a full report. If you want to work in pairs, identify both authors on the report cover sheet and upload it twice.

Environment & tools
Analyze the sample "cryptolock.exe" on a Windows virtual machine. The archive password is "infected".

Which tools to use is completely up to you. In malware analysis, there is rarely only one "right" path. Be creative and know when to stop. With disassembly, you will see many functions that will not yield any useful answers.

For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise "Combined dynamic analysis") and determine beforehand if it is safe.

The questions below provide hints about the technical backgrounds and recommended MO.

Analysis tasks

1. Perform a basic static analysis of the sample and document your findings. Is it packed? What do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting strings? (hint: PEiD, PEview, Mitec Exe explorer, Resource Hacker etc.)

2. Attempt to execute the sample and use basic dynamic analysis tools to determine whether the sample causes damage to the system. Can the sample be executed as is? If yes, what happens? If no, why not? (hint: require outputs from regshot, process explorer, process monitor)

3. Load the sample into IDA and attempt to locate the "main" function (which is not necessarily called this way). You will see a lot of exit conditions that will terminate the program when run. Where is the main function? Highlight it and expand it.

4. Document and interpret what's going on in the sample's main method. It helps to rename functions whose purpose you have identified. Which function calls can you identify and name? Locate the spot in the code where the parameters are defined. How many parameters does the sample need to function? What are their types (integer, string, etc.)? Hint: Pseudocode might help (there is an IDA plugin for that!).

5. It can be assumed that the ransomware is first reading the file, changing its contents, and then writing the new version to another file. By Combining fuzzing (i.e. supply test parameters and see what happens) with disassembly, determine the sample's likely parameters.

6. Armed with the correct parameters, use the crypto locker on some files of your choice and document what's happening (return to dynamic analysis). How is the malware altering the test files (use hex editor)?

7. It can be assumed that the ransomware is first reading the file, changing its contents, and then writes the new version to a file. One possible analysis approach can be to "follow" the source (victim) file through the encryption process. A combined approach is most promising: Use Procmon to monitor file accesses while running a debugger to locate the corresponding functionality in the code. Where are the read/write operations located in the code?

8. It is time to determine the kind of encryption that is being used by the sample. Download and use the tool "signsrch" to get an idea of what is happening. Which crypto algorithm does the malware utilize?

9. What is the key for the encryption process? Where does the crypto locker get it from? How is it processed within the malware and where does it end up?

10. Now that you know what kind of encryption is being used on the files, use a tool of your choice (e.g. online tools, GitHub apps, self- coded approach) to decrypt the CFO's file. Document the steps and the final (decrypted) result!

If you fail to decrypt the desired file, document the process with a file of your choice (where you know the key) for half the points of this item.

Attachment:- CW Specification.rar

Reference no: EM132161976

Questions Cloud

How to improve aspects of your cyber forensics crime lab : Submit a finalized 2,800-3,500-word comprehensive report and a 15-20-slide PowerPoint presentation on your Cyber Forensics Administrative Improvement Plan.
Which country or individual launched the malware : Go out to the internet and find a famous Trojan Horse. In your discussion, write as much detail as you can in 3 paragraphs. Focus on the damage it has caused.
Do you believe net neutrality will lead to it efficiency : Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses.
How was the organization impacted : Conduct a web search on organizations that were affected by Hurricane Katrina. Please select one business and cover the following.
What are the samples runtime dependencies : CTEC5807 Malware Analysis - De montfort university - Perform a basic static analysis of the sample and document your findings. Is it packed
What are the three characteristics of big data : 1. What are the three characteristics of Big Data, and what are the main considerations in processing Big Data?
Name of program magic number : Write a user input program using if else statements ONLY name of program "Magic number" the user will try guess the Magic number.
Algorithm about binary search trees : Please find and share one algorithm about Binary Search Trees. Explain it.
Pseudocode for finding the minimum value : Translate the following pseudocode for finding the minimum value from a set of inputs into a Python program.

Reviews

len2161976

11/9/2018 3:03:15 AM

Deliverables to be submitted for assessment: Written report (max. 6000 words) The results of all the analysis tasks in the both parts i.e. Part 1: Basic malware analysis and Part 2: Ransomware disassembly need to be submitted in the report. How the work will be marked: Each malware sample analysis will be awarded a total of 50 points. The 10 questions each are scored from 0 to 5 points, following a specific marking grid that considers the substance of each written response. Style and presentation are marked as well. Please refer to the criteria marking grid for details of the assessment of the work.

len2161976

11/9/2018 3:03:01 AM

Your marked coursework and feedback will be available to you on: If for any reason this is not forthcoming by the due date your module leader will let you know why and when it can be expected. The Head of Studies ([email protected] ) should be informed of any issues relating to the return of marked coursework and feedback. Note that you should normally receive feedback on your coursework by no later than 20 University working days after the formal hand-in date, provided that you have met the submission deadline. 20 days after the respective due date, results and feedback will be posted to Blackboard

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd