When we test malware, we can look at it in two ways: static or dynamic.
examine the file type file fileName - sometimes malware authors try to trick users by using misleading file extensions. In such scenarios, it is helpful to know how to find the actual file type of a file without depending on file extensions.
check the string format strings fileName - Looking at strings in a file can often give clues related to the behaviour of malware.
calculate hashes md5 fileName, sha256sum fileName and investigate it in VirusTotal
examine PE header - pecheck or pe-tree (GUI version) - The PE File Header contains the metadata about a Portable Executable file. This data can help us find a lot of helpful information to help us in our analysis.
A DLL (Dynamic Link Library) is a file containing code and data that multiple programs can use at the same time. Think of it as a “toolbox” that programs borrow from rather than building every tool themselves.
A Windows Batch file (typically with a .bat or .cmd extension) is a script that contains a series of commands to be executed by the Windows Command Prompt (cmd.exe). It is used to automate repetitive tasks by running multiple commands in a single go.
SandBox
Sandbox Evasion
08:00:27), or low CPU core counts/RAM (sandboxes are often under-resourced).Sleep() functions or long loops to wait out the sandbox’s analysis timer (usually only a few minutes) before executing the payload.Disassemblers convert the malware’s code from binary to assembly so that an analyst can look at the instructions of the malware statically. Debuggers attach to a program and allow the analyst to monitor the instructions in malware while it is running. A debugger allows the analyst to stop and run the malware at different points to identify interesting pieces of information while also providing an overview of the memory and CPU of the system.
Think of the registry like a giant recipe book.
Startup programs are the dishes the computer cooks.
Windows is the chef who reads the book and decides what to serve.
Inside the registry, Windows stores a huge amount of settings, such as
what runs at startup, user preferences, system settings, application info, and many more.
Testing a software is an integral part of cybersecurity. It is important to do it in a safe env so i won’t affect other devices should things go south.