Module: 14
malware forensics
LEARNING OBJECTIVES
The learning objectives of this module are to:
✓ LO#01: define malware and identify the common techniques attackers use to spread malware ✓
LO#02: understand malware forensics fundamentals and recognize types of malware analysis✓
LO#03: understand and perform static analysis of malware✓
LO#04: analyze suspicious word and pdf documents✓
LO#05: understand dynamic malware analysis fundamentals and approaches
LO#06: analyze malware behavior on system properties in real-time ✓
LO#07: analyze malware behavior on network real-time
l0#08: describe fileless malware attacks and how they happen
l0#09: perform fileless malware analysis-emotet
define malware and
identify the common techniques
attackers use to spread malware
define malware and identify the common techniques attackers use to spread malware
common techniques attackers use to distribute malware across web
understand malware forensics fundamentals and recognize types of malware analysis
understand malware forensics fundamentals and recognize
types of malware analysis
introduction to malware forensics
malware analysis challenges
identifying and extracting malware
preparing testbed for malware analysis
supporting tools for malware analysis
general rules for malware analysis
documentation before analysis
types of malware analysis
understand and perform
static analysis of malware
understand and perform static analysis of malware
static malware analysis: file fingerprinting
static malware analysis: online malware scanning
online malware analysis services
static malware analysis: performing strings search
static malware analysis: performing strings search
static malware analysis: identifying packing/obfuscation methods
static malware analysis: finding the portable executables (PE) information
analyzing portable executable file using pestudio
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
analyzing portable executable file using pestudio (cont'd)
static malware analysis: identifying file dependencies
static malware analysis: identifying file dependencies
static malware analysis: malware disassembly
malware analysis tool: ida pro
analyze suspicious word and pdf documents
analyze suspicious
word and pdf documents
analyze suspicious ms office document
Title
analyze suspicious ms office document (cont'd)
Title
analyze suspicious ms office document (cont'd)
Title
analyze suspicious ms office document (cont'd)
Title
analyze suspicious ms office document (cont'd)
Title
analyze suspicious ms office document (cont'd)
Title
analyze suspicious ms office document (cont'd)
Title
analyzing suspicious pdf document
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
analyzing suspicious pdf document (cont'd)
Title
understand dynamic malware analysis fundamentals and approaches
understand dynamic malware analysis fundamentals and approaches
malware analysis: dynamic
malware analysis: pre-execution preparation
monitoring host integrity
monitoring host integrity using whatchanaged portable
monitoring host integrity using whatchanaged portable
monitoring host integrity using whatchanaged portable
observing runtime behavior
analyze malware behavior on
system properties in real-time
analyze malware behavior on system properties in real-time
system behavior analysis: monitoring registry artifacts
windows autostart registry keys
analyzing windows autostart registry keys
analyzing windows autostart registry keys
analyzing windows autostart registry keys
system behavior analysis: monitoring processes
system behavior analysis: monitoring services
system behavior analysis: monitoring startup programs
system behavior analysis: monitoring startup programs
system behavior analysis: monitoring startup programs
system behavior analysis: monitoring startup programs
startup programs monitoring tool: autoruns for windows
startup programs monitoring tool: autoruns for windows
startup programs monitoring tool: autoruns for windows
startup programs monitoring tool: autoruns for windows
system behavior analysis: monitoring windows event logs
examining windows event logs
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
examining windows event logs (cont'd)
system behavior analysis: monitoring api calls
system behavior analysis: monitoring api calls (cont'd)
system behavior analysis: monitoring api calls (cont'd)
system behavior analysis: monitoring device drivers
device drivers monitoring tool: driverview
system behavior analysis: monitoring files and folders
file and folder monitoring tool: pa file sight
file and folder integrity checkers: fastfun and winmd5
analyze malware behavior
on network in real-time
analyze malware behavior on network in real-time
network behavior analysis: monitoring network activities
network behavior analysis: monitoring port
port monitoring tools: tcpview and currports
network behavior analysis: monitoring dns
dns monitoring tool: dnsquerysniffer
describe fileless malware
attacks and how they happen
describe fileless malware attacks and how they happen
introduction to fileless malware
infection chain of fileless malware
how fileless attack works via memory exploits
how fileless attack works via memory exploits (cont'd)
how fileless attack works via memory exploits (cont'd)
how fileless attack works via memory exploits (cont'd)
how files attack happens via website
how files attack happens via documents
analyze malware behavior
on network in real-time
perform fileless malware analysis - emotet
fileless malware analysis: emotet
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis (cont'd)
emotet malware analysis: timeline of the infection chain