Malware Analysis
Malware Analysis
Pavankumar u Bahadur
[email protected]
Since Proxy signature matched with Directory path traversal ../../../../ , SQL
Statements so we have Isolated the System to keep the Network Healthy.
Check Network logs with Wireshark , Firewall, Proxy , IPS , System logs ,
System Audit logs.
SOC , IR, Forensic team will collaborate in every True positive Critical
alerts so we took Full Disk Image and Memory Dump as an Evidence for
Forensic analysis.
In Static analysis we use the tool like PE Tool to check process Executable
or not , Bit size applicable for 32/64, File metadata ( creation & last modified )
, signature metadata (Integrity) , Strings (to check the readable strings so we
can conclude what variant of malware it is.
After Static n Dynamic analysis , with collected IOC' s we will check for
those logs in SIEM & EDR to check from which date logs initiated and any C2
/ Outbound Activity done.
We have to do Memory analysis by using memory dump with the tool Vertility
to find any Unknown process which starts before the Boot time ( fileless
malware which targets genuine process to executive for persistence ).
Then from Analysis if it was observed that Process was executed by User
while using Power BI & he has clicked on advertise so it is Downloaded into
user machine as Drive by Download.
So we have Guided the user to reset the passwords with complexity and
MFA
We have boot the system in Safe mood to Stop the Malicious Process and
after that we have Deleted the file from detected path.
Connected the system back to the Network and Observed closely for any
further Unusual Behaviour.
Regularly in Synch with TI to get the Information about the Newly Emerging
Threats.