Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
68 views32 pages

Understanding Malware Analysis Fundamentals

The document discusses malware analysis fundamentals including the objectives of malware analysis. Malware can damage systems by slowing performance, installing unwanted software, and causing data theft or system disruption. The objectives of malware analysis are to understand these impacts and develop indicators to detect malware infections.

Uploaded by

zarifashahbaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views32 pages

Understanding Malware Analysis Fundamentals

The document discusses malware analysis fundamentals including the objectives of malware analysis. Malware can damage systems by slowing performance, installing unwanted software, and causing data theft or system disruption. The objectives of malware analysis are to understand these impacts and develop indicators to detect malware infections.

Uploaded by

zarifashahbaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Understanding Malware

Analysis Fundamentals
Aytaj Kazimli
Balagiz Orujova
Elmira Ibrahimli
Fidan Babayeva
Zarifa Shahbazzade
Ilaha Gardashaliyeva
01 Introduction to Malware Analysis
Table of
Contents
02 Identifying malware

03 Objectives of Malware Analysis

04 Static analysis

05 Dynamic analysis

06 Role of Threat Intelligence in


Malware Analysis
01
Introduction to Malware
Analysis
Malware, or “malicious software,” is an
umbrella term that describes any malicious
program or code that is harmful to
systems.
Hostile, intrusive, and intentionally nasty,
malware seeks to invade, damage, or
disable computers, computer systems,
networks, tablets, and mobile devices,
often by taking partial control over a
device’s operations.
Malware Analysis and its Benefits

Incident Response
Threat Threat Hunting
Intelligence
Malware analysis provides a By dissecting and examining the Malware analysis
very accurate and malicious software involved in the knowledge helps
comprehensive list of IoCs attack, incident responders can cybersecurity engineers to
compared to other methods identify its characteristics, behavior, be more professional
such as log analysis or digital and capabilities. This deep threat hunters who
forensics. understanding allows them to understand the attackers'
determine the attack vectors used by techniques and tactics on
the malware to infiltrate systems, a deeper level and who
exploit vulnerabilities, and evade are fully aware of the
detection mechanisms. context.
Malware Analysis Process
Acquisition Static Analysis

01 The first step is to obtain a sample of


the malware for analysis. This can be
done through various sources such as
malware repositories, email
attachments, network captures, or
02 Includes File Identification,
Metadata Analysis, Code
Disassembly and Signature
Matching

incident response activities.

Dynamic Analysis Reporting and

03 Includes Environment Setup,


Behaviour Setup, Network Traffic
Analysis and System Call Tracing 04 Remediation
Document findings and analysis
results in a comprehensive report,
including details such as malware
indicators, behavior patterns, and
mitigation recommendations.
Types of Malware
Adware Spyware

01 Adware displays unwanted and


sometimes malicious
advertising on a computer
screen, captures user data that
02 Spyware is a form of
malware that hides on
your device, monitors
activity, and steals
can be sold to advertisers sensitive information

Ransomware Trojans

03 Ransomware is malware
designed to lock users out
of their system or deny
access to data until a
04 A Trojan disguises itself
as legitimate software to
trick you into executing
malicious software on
ransom is paid. your computer.
Worms Viruses

05 Worms spread over computer


networks by exploiting
operating system
vulnerabilities.
06 A virus is a piece of
code that inserts itself
into an application and
executes when the app
is run.

Keyloggers Fileless malware

07 A keylogger is a type of
spyware that monitors
user activity.
08 Fileless malware is a type
of malicious software
that uses legitimate
programs to infect a
computer.
What can malware do?
•Malware attacks can crack weak passwords, bore deep into systems, spread through networks, and disrupt the daily
operations of an organization or business. Other types of malware can lock up important files, spam you with ads, slow
down your computer, or redirect you to malicious websites.

•Malicious software is at the root of most cyberattacks, including the large-scale data breaches that lead to widespread
identity theft and fraud. Malware is also behind the ransomware attacks that result in millions of dollars in damages.
Hackers aim malware attacks against individuals, companies, and even governments.
How To Know if You Have Malware
 suddenly slows down, crashes
 won’t shut down or restart
 serves up lots of pop-ups,
inappropriate ads, or ads that
interfere with page content
 shows ads in places you typically
wouldn’t see them, like government
websites
 shows new and unexpected icons on
your desktop
 runs out of battery life more quickly
than it should
Why do hackers and cybercriminals use malware?

Cyberwarfare and
Data theft international espionage Sabotage Extortion

1 2 3 4

Entrepreneurship DDoS attacks Mining cryptocurrency

1 2 3
Malware's Propogation
.

Malware propagation is performed


by an attacking message being sent
to the victim's computer, with the
intent of exploiting a vulnerability in
that system to compromise it.
1.Vectors of Propagation
2.Social Engineering Tactics
3.Exploiting Vulnerabilities
4.Network Propagation Techniques
03
Objectives of
Malware Analysis
Damage caused by malware

So how does malware impact your computer’s


performance? Here are a few ways:
• Installing additional software.
• Creating unwanted popup ads.
• Redirecting web browser searches.
• Slowing connection speeds.
• Switching computer settings.
• Changing the homepage.
• Disrupting network connection.
Hardware failures

Because the hardware that’s used within


modern computers is relatively well
protected against damage that can result
from software faults, computer viruses can
also cause the failure of hardware
components. However, hardware failure is
still a possibility. A Trojan virus may
perform a repetitive action – for example,
repeatedly opening and closing the CD tray.
Even though these electromechanical
components are generally very reliable, this
repeated opening and closing could
eventually cause the CD drive to fail.
System
Data Theft
Disruption
System disruption malware aims to
Malware designed for data theft aims to interfere with the normal operation of
extract sensitive information from computers, networks, or infrastructure. This
compromised systems. This could financial can occur through denial-of-service attacks,
data, intellectual property, or any other which flood systems with traffic to render
valuable data. them inaccessible. Additionally,
Examples of data theft malware include ransomware encrypts files and demands
keyloggers, as well as data-stealing Trojans, payment for decryption, while destructive
which extract files and data from infected malware causes permanent of data and
systems. systems.
Context: an artifact
Observable:
must fit the specific it
IOCs act as flags that cybersecurity professionals use
to detect unusual activity that is evidence of or can

must
context display
inindicator
lead to a future attack.
Three conditions an which signs
must satisfy:

that
the
Metadata: a malicious
attack there
event
happened.
must be hasadditional
For
transpired.
example,
information if athat
phishing
helps security occurs, the
IoCs
teamsshould make sense be
things
of the IoC. like This can
suspicious
include theURLs or
suspicious email
Common types of IOCs

Strange outbound network traffic


A high or unusual amount of traffic from
your server could be a sign of command
and control (C2) communication. This
could be traffic from an internally
compromised system to an external C2
communication center.
Large number of unsuccessful login
04
Static
Analysis
What is Static Malware
Static Analysis?
malware analysis involves the examination of a
suspicious file without executing it. It involves inspecting
the file header, metadata, strings, resources, and code of a
suspicious file. It can use tools like hex editors,
disassemblers, debuggers, and decompilers to extract
information from the file.
Benefits and Limitations

Benefits: Limitations

• Faster and more efficient - More difficult and time-consuming


• Safer - more prone to errors and false
• More comprehensive positives
• More reliable - more susceptible to evasion and
anti-analysis techniques
Static Analysis Techniques

01 File Fingerprinting
02 Code Reversing

03 Code Analysis
04 Strings Analysis
05
Dynamic
Analysis
Dynamic analysis
Dynamic analysis: Launches and
studies malware.

No deep understanding of packing


needed.

Does not require understanding of


malware’s packing.

Allows real-time malware


observation.
Isolation techniques:
Running malware on a physical machine.
Disabling outside communication.
Virtualizing environment and mimic network services.

Sandbox examples:
Norman Sandbox, Cuckoo sandbox, GFI, etc.

Executing malware:
EXE: Launch executable files directly.
DLLs: Use rundll32.exe with DLL name and exports as
arguments.
Process Monitor:
Observes system resources.
Records changes in resources.
Detailed explanation.

Event Types: File creation, registry


changes.
Filtering: Certain events like run key
event.
Network Simulation

• Simulated DNS: Redirects malware traffic


on Linux VM.
• Tricks malware into thinking it reached
the internet.
• Network Traffic Fingerprinting identifies
malicious payloads.
• Command and Control Analysis: Analyzes
packets sent by malware.
• Fingerprinting: Uses beacon information
to identify infected machines.
06
Role of Threat
Intelligence in
Malware Analysis
What is threat intelligence?

Threat intelligence refers to the


collection, analysis, and
dissemination of information about
potential and current cyber threats. It
involves understanding the tactics,
techniques, and procedures (TTPs)
employed by malicious actors, as
well as their motivations and
capabilities.
Importance of Threat Intelligence in
Malware Analysis
Early Attribution Incident
Detection and Context Response
Improvement

1 2 3 4 5

Enhanced Customized
Situational Defenses
Awareness
Application of Threat Intelligence in
Malware Analysis

WannaCry
Stuxnet (2010) APT29 (Cozy
Ransomware (2017)
Bear)
Threat intelligence The global WannaCry Threat intelligence
played a significant role ransomware attack was has been crucial in
in the analysis of analyzed using threat tracking the activities
Stuxnet, a highly intelligence to understand its of advanced persistent
sophisticated malware propagation methods and the threat (APT) groups
that targeted SCADA vulnerabilities it exploited, like APT29.
systems. namely the EternalBlue
exploit
Thanks!

You might also like