Lab Proj 04 - Unpacking
Lab Proj 04 - Unpacking
Purpose
Malware Samples
6. Run PEiD on the file. It shows that the file is packed with UPX, as shown in
the EP Section below.
7. Run PEview on the file. The file has sections labeled UPX0, UPX1, and
UPX2, as shown below.
8. These are section names produced by the UPX packer.
Unpacking the File with UPX
15. Analyze the unpacked file with PEiD. It now is recognized as a Microsoft
Visual C++ 6.0 file, as shown below.
Finding the Entrypoint
16. Find the Entrypoint which is covered by a green box in the image above.
Imports
24. Find the strings in the unpacked file. You should see the API names
InternetOpenURLA and InternetOpenA, and the Command-and-Control
URL http://www.malwareanalysisbook.com, as shown below.
25. These suggest that infected machines will connect to
http://www.malwareanalysisbook.com. The name of the running service,
MalService, is also visible.
Saving a screen image
26. Make sure the strings covered by the green box in the image above are
visible.
27. Press Alt + PrintScrn. That will copy the whole desktop to the clipboard.
YOU MUST SUBMIT A FULL-SCREEN IMAGE TO GET FULL
CREDIT!
28. Open Paint and paste in the image.
29. Save the image with the filename Lab-Proj4b-YOURNAME.png. Use your
real name, not the literal text YOURNAME.
30. Find the packer used for sample Lab01-03.exe. Ignore everything except
the primary packer name, which consists of three capital letters.
35. Submit the images, you save in the steps Saving a Screen Image,
to: cms with a subject line of Lab-Proj4-YOURNAME, replacing
YOURNAME with your own first and last name.