Lab 1
Lab 1
Purpose
You will practice the techniques in chapter 1.
Install 7-Zip
On your Windows machine, in a Web browser, go to http://www.7-zip.org/
https://practicalmalwareanalysis.com/labs/
The file extracts to an EXE file. Double-click it to perform a second extraction process. Click the
Accept button. Click the Extract button.
A folder named "Practical Malware Analysis Labs" appears. The files you need are in that folder,
in a subfolder named "BinaryCollection".
This project uses the files Lab01-01.exe and Lab01-01.dll, both in the "Chapter_1L" folder.
This project follows Lab 1-1 in the textbook. There are more detailed solutions in the back of the
book.
VirusTotal
Upload the Lab01-01.exe and Lab01-01.dll files to www.virustotal.com
Save this image with the filename "Proj 1a from YOUR NAME".
PEview
You can download PEview from here:
http://wjradburn.com/software/
Open the files in PEview. For each file, find the "Time Date Stamp" as shown below.
The files were both compiled on the same date within a minute of each other, indicating that they
are part of the same package.
We will grade it based on the "Data" column of the "Time Date Stamp" field.
Save this image with the filename "Proj 1b from YOUR NAME".
PEiD
You can download PEiD here:
http://www.softpedia.com/progDownload/PEiD-updated-Download-4102.html
Open the files in PEiD. They are identified as "Microsoft Visual C++" files, which shows that
they are unpacked.
BinText
BinText is a handy tool to view strings.
Get it here:
https://www.mcafee.com/us/downloads/free-tools/bintext.aspx#
Now you can see that the command to launch a program is exec, as shown below.
Turn in the image showing your analysis of Lab01-01.dll as shown above.
Save this image with the filename "Proj 1d from YOUR NAME". Then collect the strings from
the Lab01-01.exe file.
http://www.dependencywalker.com/
Troubleshooting
If that link fails, use this alternate download link:
https://samsclass.info/126/proj/depends22_x86.zip
There are several imports in the upper right pane, and exports in the middle right pane. Scan
through them--these are normal for any EXE.
In the left pane, click KERNEL32.DLL.
In the "PI^" section (Parent Import), you should see FindNextFileA and FindFirstFileA as
shown below.
Save this image with the filename "Proj 1e from YOUR NAME". Open Lab01-01.dll in
Dependency Walker. Notice that it imports functions from "WS2_32.DLL".
WS2_32.DLL has networking functions. The right center pane shows function names that
perform networking tasks, such as "bind", "closesocket", and "connect", as shown below.