CTEC5807 Malware Analysis Assignment

Assignment Help Computer Networking
Reference no: EM132597909 , Length: word count:5000

CTEC5807 Malware Analysis - De Montfort University

Assignment - Malware Investigation

Learning outcome 1. Identify and analyze malware using appropriate procedures, tools and techniques
Learning outcome 2. Interpret and communicate the significance of malware behavior to decision makers
Learning outcome 3. Distinguish and critically compare malware delivery and spreading techniques
Learning outcome 4. Assess and synthesize the likely impact of a malware infection from its binary

In this coursework, you are expected to:

Analyze two specimens of malware and write a report answering set of questions about the insights gained and detailing your approach with relevant evidence (e.g. screenshots, excerpts of logs, etc.)

Part 1: Basic malware analysis

Scenario and goal

This is part 1 of the graded exercise. It is worth 50% of your total grade. Every question is worth 5 points, for an exercise total of 50.
In this scenario, an acquaintance was e-mailed a suspicious attachment and wants to know if it is malicious. He already opened the file and was surprised to see a foreign-language sentence. Now he is concerned that he is infected with malware.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors on the report cover sheet and upload it twice.

Environment & tools

Statically and dynamically analyze the unzipped sample "29-10-2014_Quittung.rtf" on a Windows XP SP3 virtual machine. The archive password is "infected". Please note that this is real malware.

Which tools to use is completely up to you. In malware analysis, there is rarely only one "right" path. Be creative! Still, I suggest you look at previous exercises and pick whatever tools you deem appropriate.

For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise "Combined dynamic analysis") and determine beforehand if it is safe.

Analysis tasks

1. Analyze the social engineering component of the malware. Translate it. How does it try to get people to execute it?

2. Your friend has already opened the document attachment. What happened? Is his machine already infected? Find proof for/Argue your answer!

3. Extract the core malware and document the steps.

4. Perform a basic static analysis of the sample and document your findings. Is it packed? What do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting strings? Remember: MSDN is your friend!

5. Analyze the sample dynamically and monitor the activity on the system. What changes? Is anything dropped, executed or deleted? If you use Regshot, be careful to set the right scan directory (C:)!

6. Can you find indicators for sandbox or VM detection? What can you do to circumvent it? Restart your analysis after taking care of the anti-analysis technique(s).

7. Try to find out what the sample is about to do network-wise and set up an appropriate fake environment. What is happening?

8. What are the sample's runtime dependencies? What is it trying to download? Try to play along and set up the environment it wants and determine what the malware needs the additional software for.

9. Extract and document all relevant IP addresses that are or might be contacted (static and dynamic analysis) and determine domain ownership.

10. If you satisfied all the sample's requirements (i.e. installed all the components it needs) the malware will alter your system's configuration. What is happening? Hint: Certificates.

Part 2: Ransomware disassembly

Scenario and goal
This is part 2 of the graded exercise. It is worth 50% of your total grade. Every question is worth 5 points, for an exercise total of 50.
In this scenario, your company's CFO was victim of a crypto locker, losing all her precious holiday photos. She comes to you in hopes that you'll be able to help her recover her files without paying the ransom. The incident response team has already located the malicious sample and provides you with both the malware and an encrypted sample that needs to be recovered at all costs.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors on the report cover sheet and upload it twice.

Environment & tools
Analyze the sample "cryptolock.exe" on a Windows virtual machine. The archive password is "infected".
Which tools to use is completely up to you. In malware analysis, there is rarely only one "right" path. Be creative and know when to stop. With disassembly, you will see many functions that will not yield any useful answers.
For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise "Combined dynamic analysis") and determine beforehand if it is safe.
The questions below provide hints about the technical backgrounds and recommended MO.

Analysis tasks

1. Perform a basic static analysis of the sample and document your findings. Is it packed? What do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting strings?

2. Attempt to execute the sample and use basic dynamic analysis tools to determine whether the sample causes damage to the system. Can the sample be executed as is? If yes, what happens? If no, why not?

3. Load the sample into IDA and attempt to locate the "main" function (which is not necessarily called this way). You will see a lot of exit conditions that will terminate the program when run. Where is the main function? Highlight it and expand it.

4. Document and interpret what's going on in the sample's main method. It helps to rename functions whose purpose you have identified. Which function calls can you identify and name? Hint: Pseudocode might help (there is an IDA plugin for that!). You might also want to return to/continue this part of the exercise later during task 9.

5. What parameters does the sample need to function? What are their types (integer, string, etc.)? Combine fuzzing with disassembly (i.e. supply likely parameters and see what happens and also locate the spot in the code where the parameters are defined).

6. Armed with the correct parameters, use the crypto locker on some files of your choice and document what's happening (return to dynamic analysis). How is the malware altering the test files (use hex editor)?

7. It can be assumed that the ransomware first reads the file, change its contents, and then writes the new version to a file. One possible analysis approach can be to "follow" the source (victim) file through the encryption process. A combined approach is most promising: Use Procmon to monitor file accesses while running a debugger to locate the corresponding functionality in the code. Where are the read/write operations located in the code?

8. It is time to determine the kind of encryption that is being used by the sample. Download and use the tool "signsrch" to get an idea of what is happening. Which crypto algorithm does the malware utilize?

9. What is the key for the encryption process? Where does the crypto locker get it from? How is it processed within the malware and where does it end up?

10. Now that you know what kind of encryption is being used on the files, use a tool of your choice (e.g. online tools, GitHub apps, self- coded approach) to decrypt the CFO's file. Document the steps and the final (decrypted) result!

If you fail to decrypt the desired file, document the process with a file of your choice (where you know the key) for half the points of this item.

Reference no: EM132597909

Questions Cloud

How do feel will change society in the future : An important perspective in social change. In your opinion, how has it changes society and how do you feel it will change society in the future?
What is the required sales revenue : Restaurant has monthly sales revenue of $100,000, variable cost of $65,000, and fixed cost of $30,000. What is the required sales revenue
Defining art and paleolithic cave painting : Do you consider a beautifully made tool to be a work of art? Is a utilitarian or functional object automatically excluded from being art?
What is the break even revenue : The contribution margin is 50% for t-shirts and 40% for mugs. If fixed cost is $2,000 then what is the break even revenue
CTEC5807 Malware Analysis Assignment : CTEC5807 Malware Analysis Assignment Help and Solution, De Montfort University - Assessment Writing Service - Identify and analyze malware using appropriate
What is the RevPAR : Question - Hotels annual room sales revenue is 642,400. The hotel has 40 rooms and an 80% occupancy rate. What is the RevPAR? Assume 365 days a year
Identify whether they are renewable or nonrenewable : a) Identify the five basic resources needed b) Identify whether they are renewable or nonrenewable.
What is the average check for dinner : Restaurant has 80 seats with seat turnover of 2. It serves dinner 312 days a year. Annual sales revenue is 1,200,000. What is the average check for dinner
Cycling nutrients through biogeochemical cycles : Ecosystems are maintained by cycling nutrients through biogeochemical cycles; some are gas and others are sedimentary. Consider the nitrogen and phosphorus cycl

Reviews

Write a Review

Computer Networking Questions & Answers

  Investigate employees connect using wireless and not cables

You are the Network Manager for a large bank. You have been asked to investigate having employees connect using wireless and not cables.

  Design a parallel adder using only half-adders and or gates

Design a 3-bit parallel adder using only half-adders and OR gates. Show how you can use three full adders to design a 3-bit subtractor using the 2s complement.

  Simple implementation of initialization of datatypes

MN404 - Fundamentals of Operating Systems and Java Programming and corresponding datatypes and associated methods of Java classes - develop a system

  Develop architectural internetworking design for business

Assessment Title Network requirement analysis and plan (Assignment 1) - Develop architectural internetworking design for the business.

  Centralized versus decentralized database management systems

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly used.

  Analyze the changes in 4g technology

Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today's applications.

  Ciphertext which was encoded with a shift cipher

the following ciphertext which was encoded with a shift cipher: xultpaajcxitltlxaarpjhtiwtgxktghidhipxciwtvgtpilpitghlxiwiwtxgqadds.1. Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify th..

  CTEC5806 Digital Forensics Assignment

CTEC5806 Digital Forensics: Principles and Practice DL Assignment Help and Solution, De Montfort University - Assessment Writing Service

  What packets be in message from office router to the isp

Suppose the example used a layer-2 VPN protocol called L2TP.  - Draw the messages and the packets they would contain.

  Process routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  Identify cloud computing security risks

Analyze virtualization and explain how it differs from cloud computing. Identify cloud computing security risks and recommend ways to mitigate those risks.

  Network performance management and troubleshooting exercise

Network management environment setup and Explain your selection of the network management architecture and show the implementation of the architecture on eNSP

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd