Reference no: EM132831828
TASK:
For the purpose of this CA you are expected to setup a malware analysis lab (please note that you are not allowed to just download an existing sandbox, but you can include a critical analysis discussing how looking at such sandboxes you learned good practices on creating your lab). In addition, you should carry out a research-based investigation into a piece of malware. The students will have to document the work carried in the form of a report and include clear evidence (descriptions and screenshots).
REPORT STRUCTURE:
1. Malware Lab
a) VM Setup: Description and justifications of the VM setup (i.e., guest Windows OS version and configuration details, VM settings, etc.).
b) Software Tools: Description of the software tools installed and justifications of their selection (i.e., vis-a-vis alternative tools).
c) Gateway: Description of the virtual gateway setup and/or other network components (if any).
d) Lab Testing: Description d justification of the testing activities carried out to ensure that the lab is properly configured and isolated from the production environment (i.e., host, net
2. Research-based Malware Analysis
a) Executive Summary: Brief description the objective and key findings of the analysis.
b) Identification: Description of the malware sample, and any information available in the public domain or that can be obtained using an online tool: e.g., type of the file, its name, size, hashes, malware names (if known), current anti-virus detection capabilities, etc.
c) Analysis: detailed descriptions of the malware capabilities, behaviour, etc. This analysis should be conducted without downloading the malware using only online resources such as research papers (i.e., check Google Scholar), malware analysis reports previously done by companies/ bloggers, online tools and sandboxes (e.g., VirusTotal, ThreatMiner, Joe Sandbox), etc.In your analysis identify those parts which are Static Anoiysis, and those which constitute
d) Conclusions: Summary of findings, recommendations and next steps (i.e., whet would you do if you would download the sample malware).
Cyber Kill Churn. Explain your findings by way of the Cyber Kill Chain - what indicators can be used to implements mitigations at each stnge of the Kill Chain.
3. References Include references to all the resources you consulted when preparing this CA (e.g., research papers, web resources, etc.)
4. Appendix: Include screenshots and any additional details if required (as the main part of the report should be limited to 10 pages in a simple 1 column 12pt format).
1 INTRODUCTION
1.1 MALWARE LAB ENVIRONMENT
1.2 VIRTUAL MACHINE LAB SETUP
1.3 WINDOWS 7 32-bit
2 TOOLS USED
2.1 GATEWAY
2.2 LAB TESTING
3 RESEARCH BASED ON MALWARE ANALYSIS
3.1 EXECUTIVE SUMMARY
3.2 IDENTIFICATION
3.3 ANALYSIS
4 CYBER KILL CHAIN OF
REMEDIES TO STOP MALWARE
CONCLUSION
REFERENCES
APPENDIX
Attachment:- Malware analysis lab.rar