Malware Analysis Report #1

L

LabZero

Thread author
Introduction

In this thread I'd like to make a dynamic analysis of a malware using Regshot.
This software allows you to track changes made to the Windows registry by the installation of a program or, in our case, by running a malware.
The tutorial of Regshot it was illustrated by @kram7750 in his thread: http://malwaretips.com/threads/how-to-start-analyzing-malware-guide.42291/
In the future, in the next report, if other tools tool works for analysis malware, I'll do a tutorial (if it doesn't already exist) as an introduction to proper use.
I thought I'd make a simple outline for posting the reports in order to simplify the procedure (I hope you like it, all comments are useful).
Of course before you begin, you must have a virtualization software to create a totally isolated Guest system from the Host system.
A virtual machine, Virtualbox or VMware Player.
I try ' Shadow Defender (light virtualization) , a shareware program very stable and secure.
OK, let's get started.

Virtualization tool
Shadow Defender : http://www.shadowdefender.com/

Malware Analysis tool
Regshot : http://sourceforge.net/projects/regshot/

Tipe of Analysis
Dynamic

Malware Identification
Adware

Link to malicious samples : hxxp://rghost.net/7FqNDWSG4

Archive password
infected

VirusTotal report link : https://www.virustotal.com/it/file/...7f1be5b705ebd0f210094fd6/analysis/1428851615/

Malware Analysis
Run Regshot



Cattura.PNG




Create 1°snapshot to save the state of the registry before you run the malware.
After this step, do not start other applications to not create other changes besides those of the malware.




Cattura.PNG



Run malware


Cattura6.PNG



Create 2° snapshot to save the state of the register after execution of the malware


Cattura1.PNG




Click Compare to have the results log



Cattura2.PNG




Cattura5.PNG


Cattura4.PNG



Comments

From the comparison of the results you can see registry entries created and modified by malware.
Checking carefully you can understand the actions taken by the malware to the operating system.

Enjoy with Malware Analysis :)
 
Last edited by a moderator:
L

LabZero

Thread author
I did do a tutorial on using Regshot with and without malware execution. Nonetheless, nice thread. ;)


I stopped doing Malware Analysis threads; unless oher people start you'll be the only one doing them now to my attention. Go for it.
I wanted to give my contribution.;)
I wouldn't want this project ends :(
Your posts are very thorough and complete and I think your contribution should not finish ...
 
Last edited by a moderator:
L

LabZero

Thread author
I really like MA and I wish people would put their reports:)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top