How to analyze a malware.

PcTek9

Well-Known Member
Reaction score
87
Location
Mobile, AL
If you want to analyze a malware on a windows machine. Download windbg from microsoft. You can use windbg to attach to a malware process running in the machines memory, (ideally one would use a vm and infect that, and use windbg in the vm right????), you can stop the process, set breakpoints, and so on.
It is helpful to get a book on assembly language programming, and read it. I highly recommend Kip Irvine's book, it's simply great for learning assembly.
As code runs through the commands as it executes, (the programming commands), it goes from line to line, or jumps around a lot. Assembly language jumps around a lot. In most languages that is highly discoruaged, and people sometimes refer to it as "spaghettii code". You won't find this sort of activity in procedural languages like cobol. Assembly jumps around in the code so much that there is more than one jump command. And in fact the command is called just that... Jump, abreviated jmp. The other commands like JNZ or jump not zero, JAB jump above, JBE jump below, JGE jump greater than or equal to, and so on... are all 3 letter acronyms for the command. So a lot of jumping going on.
Anyway... In programming languages, it is possible to let a program run through the program from the start, to a point you set for it to stop, so you can look at certain values in memory and in variables, and so on. This is called setting a break point (bp). When you set a breakpoint in windbg, the program will run to that location and stop, then you can check what values are in different variables, literally print any variable you have a question about, in that point in time to the screen. Very helpful to programmers.
After you look at what's in the variables you can resume the program, usually with f5. And let the trojan/virus run to the next breakpoint or to the end... or until it stops on it's own waiting for something like user input, or a message on a socket from a server in china... etc.
How does this help? Well if you know the activity you are looking for, it's possible to search for that activity using windbg, and set a breakpoint, then ... you can get the calling routines address or addresses off the stack, and use those to go to that part of the code and read it to see how it got there and what it is doing. How? Well. If you are waiting on the malware to call an interuppt for display, or disk, or something else, you'd look for that interupt to be called. So entering bp for an interupt example: bp int21h would cause the malware to stop when that interrupt gets called. If you are waiting for something to come in from the net, then enter bp recv(), and the program stops there... Then get the calling address off the stack by simply clicking on the hyperlink. Write these down.
Next download a program like The Borg, or any other windows disassembler program, (there's about 20 I know of...). You can find the malware executable and load it into borg, and literally disassemble it into assembly code. Once you do that, you can check the addresses (equivalent to line numbers sort of) in the code that you got from the stack to find out what called that subroutine, and what that subroutine does.
Sometimes you do have to use a program that decrypts the trojan or virus before you can use a disassembler. There are programs circulating the net for this, some people call them "unpackers", b/c they decrypt and unpack an executable into normal executable code. This way your disassembler can just grab it and open it up like a delicious box of white cheddar cheez-it snack crackers. Once you see the code, if it's your first time, you will probably be in shock.
Even a small trojan or virus can be thousands of lines of code... Though mostly a good understanding of assembly language will help you so much in comprehending what is going on. If you complete Kip's book, you'll be writing assembly language programs in no time, and focusing on this technically intense aspect of malware will become like second nature to you.
 
How, Denis, would virustotal.com be useful in the scencario that @PcTek9 described? He's talking about analysing a known piece of malware and seeing how it operates not finding out if it's malware or not. I can't see a use for virustotal.com there. Perhaps I'm wrong?
Yes you are right, I just add useful link for other users who want to check files on malware.
Usually analysis of a virus file do in the anti-virus labs

I can suggest to use a SysInternals tools from Mark Russinovich,
https://technet.microsoft.com/en-us/sysinternals
procexp, regmon and other tools
 
Last edited:
I would suggest sandboxing the the VM with Comodo sandbox or a similar application.
In addition I would also keep it completely cut off from your personal network or, if you want to use a network, use something to prevent your public IP from being used.
 
It all depends on how detailed you want to be, and what type of malware you're going after, and why you're researching.

I write a PUP removal tool, and it's a niche utility. I just want to clear a PC of obnoxious software and clear the way for a traditional malware scanner. I mainly use a sandbox approach when I'm not using log information that is phoned home to me.

Modern rootkits and other "stealth" threats (and advanced crypto malware) can detect your debugger, sandbox, and even if you're running it on a virtual machine (back to assembly language here, it tries to execute an illegal operation and see if the system objects). You'll need tougher stuff than sandboxie to work with this malware.

I would say that VirusTotal is a very useful tool, but it's not for anti-malware research. It just summarizes the research others have done (via if it detects the sample as malware).

For the tougher stuff, you'll need something like this: http://nsmwiki.org/Truman_Overview I really want to get a server setup, but the guides I've found in the past weren't very good, and I haven't had time to build it from scratch with no documentation.
 
Can a web security scanner software such this help in analyzing malware? Just curious. We received a proposal for that kind of service/solution a week ago but we're not actually in a hurry to consider since our target this year is more of improving our website and marketing campaigns. However, if it is something that could be of great help to our company, we might give it a try next year.
 
Can a web security scanner software such this help in analyzing malware?

Not exactly. This can help prevent malware from attacking your website (say if you run a web server with JavaScript or PHP, etc) it will scan your website and see if it is venerable to any attacks (buffer overflow, XSS, SQL injection, etc) and alert you to the issue so you can fix it.

For example, website X has some old JavaScript code, and it allows an attacker to add elements to the webpage (like a drive by download) if the attacker's website is open in another tab. Think of a spam email. If an attacker sends out a spam email message with a link to a bad page, all that is required for malware to be downloaded onto your system is for you to have a venerable website open in another tab.

A tool like that one would help you discover that you are venerable to such an issue, but it would not protect your web server from such an attack (an IPS would prevent a good chunk of attacks though).

See https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) for more details.
 
Back
Top