File Information
Metadata: List basic file information such as creation date, OS compatibility, and
hostname if available.
Hash: Calculate and document hash values (MD5, SHA1, etc.) for integrity verification.
Check entropy to detect if the file is packed.
Sectioning: Identify different sections within the file and their purposes.
Process Information
Explain how the analyzed file executes, potentially using flowcharts or graphs to illustrate
execution paths. If process injection is detected, explain its mechanism.
Investigation
Online Presence: Search for the file's hash on platforms like VirusTotal to gather
information on its reputation and detections.
Preliminary Analysis: Document detection rates across antivirus solutions and any
known associations with threat actor groups.
Program Strings
Identify and analyze strings within the file to hypothesize its functionality and potential
objectives.
IAT (Import Address Table)
List and describe the DLLs and APIs that the file interacts with through the IAT, highlighting 5-
7 significant APIs.
Technical Analysis/Detailed Writeup
Utilize tools like debuggers, disassemblers, and API monitors to delve deeper into the file's
behavior:
Persistence Techniques: Identify methods used by the file to maintain persistence on the
system.
Process Monitor: Capture screenshots to illustrate the file's interactions with the system.
Wireshark: Analyze network traffic if applicable.
Macro Analysis: If macros are present, analyze their behavior, possibly using
cmdwarser.
Create a detailed flowchart outlining critical activities:
Impact assessment (laymen's terms): Describe the potential damage or actions the
malware can perform.
IOC (Indicators of Compromise): Provide YARA rules in JSON format for SIEM
integration.
Impact
Explain the implications of the malware's activities in straightforward language, focusing on both
technical and business impacts.
Remediation/Recommendation
First 5 Recommendations: Provide actionable steps to mitigate the malware's effects
and prevent future incidents. Include:
o Steps for malware removal while preserving data integrity.
o Recommendations for preventive measures such as antivirus installation and
system hardening.
Create a hypothetical scenario outlining how to prevent similar incidents.
Conclusion
Summarize key findings and recommendations. Include any additional insights or suggestions
for further analysis if necessary.
Additional Notes
Consider adding any supplementary information that enhances the understanding of the
malware's behavior or its impact.