Malware Analysis

R11,999.00

Malware Analysis is the study and close examination of malware to understand its origins, purpose, and potential impact on the system. Malware analysts accomplish their tasks by using various tools and expert-level knowledge to understand not only what a piece of malware can do but also how it does it. This course provides participants with the practical skills and knowledge to be able to analyze malware and exposes them to a critical set of tools required for their tasks.

Duration: 40 Hours

Target Audience
The course targets participants with a foundation understanding of the internet, who wish to gain advanced capabilities in open-source intelligence.

  • Cybersecurity practitioners
  • Cyber forensics analysts
  • Security engineers/researchers
  • Incident responders
  • Junior malware analysts or reverse engineers
  • Software developers
  • IT security administrators

Pre-requisites

  • ThinkCyber Level-1 courses

Objectives

  • Malware analysis using both Dynamic and Static analysis methods
  • Assembly language to examine malware
  • Reverse engineering malware using various tools
  • The first glimpse into Windows kernel
Category:

Description

Module 1: Introduction to Malware Analysis

In the first module, students will study different types of malware and see how they operate, understand how the anti-virus works, and will eventually develop an idea of how to approach a malicious file and where to find it.

  • Introduction to Malware Analysis
    o Malware Analysis Definitions
    o Types of Malware
    o Different Behaviors of Malware Types
  • Behavioral Analysis
  • Code Analysis
  • Memory Analysis
    o Security Mechanisms
    o How the Anti-Virus Works
    o Understanding PE Format
    o Hash and File Identification
    o Windows Libraries and Processes
    o Windows APIs
    o Setting Up a Safe Environment for Inspecting Malware
  • Building and Configuring Virtual Machine
  • Malware Analysis Tools
    o Process Hacker
    o Process Monitor
    o Regshot
    o API Monitor
    o IDA
  • Extracting malware from data segments
    o Network PCAP file
    o Volatile Memory (RAM)
    o Basics of Volatile Memory Malicious Activity Research
  • Network Connections
  • Malfind
  • Process
  • DLL
  • Memdump

Module 2: Basic Static Analysis

Basic static analysis allows the malware-researcher to inspect the influences of malware on the system, while it is in a static stage, that is, in code format. This phase is critical for collecting information about the malware for more advanced stages of the research.

  • Basic Static Analysis
    o Security Concerns
  • Double-Click Prevention
  • Auto-run Prevention
    o First Analysis with Strings
  • Identify Libraries
  • Identify Patterns
  • Identify the Domain
  • Identify Windows Functions
    o PE file Sections
  • Common Sections
  • Anomaly Sections
    o Information Gathering from PE
  • Timestamp
  • GUI or CLI Application
  • Virtual Memory Allocation
  • Entry Point
    o Analyzing Program Dependency Libraries
  • Exports and Imports
  • Function Calls by Ordinal Number
    o Resources Section Anomaly
    o VirusTotal
    o Database of File Hashes
    o Writing Static Analysis Report

Module 3: Basic Dynamic Analysis

Basic Dynamic Analysis is the initial method of inspecting and analyzing malware. During this stage, students will activate the malware in a protected sandbox environment and analyze its effects on the system. Various tools for malware analysis will be introduced and used by participants during this module.

  • Basic Dynamic Analysis
    o Organize and Isolate your Environment
    o New Malware System
  • Identifying Virtual Machines
  • Searching for Ports
  • Testing Network Traffic
    o Snapshot System
    o Analyzing Processes
  • Procmon
  • Process Explorer
    o Registry Analysis
    o Monitoring Registry Changes
    o Analyzing Autoruns
    o Network Traffic Monitoring with Wireshark
    o Faking Network Traffic and Configure Proxies
    o DNS Monitoring
    o Simulating Internet Services
    o Analyzing Findings

Module 4: Assembly x86

This module will introduce the basics of Assembly language, which is the closest to computer binary language that can be read by humans. Familiarization with Assembly will allow students to gain a closer insight into what lies at the base of the malware’s code and how it was meant to operate when activated and is an entry ticket into the world of reverse engineering.

  • Assembly Language Basics
    o x86 Processor Architecture
    o Understanding Buses and Data Traffic
    o Syscalls Table
    o Number and Character Representation
    o Basic Assembly x86 Programming
  • Standard Output
  • Registers
  • Variables and Reserves
  • Strings in Assembly
  • Working with Numbers
  • Jumps and Flags