SlideShare une entreprise Scribd logo
1  sur  54
Advanced Malware Analysis Training Series




        www.SecurityXploded.com
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS" without
any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are
solely of the trainer’s only and nothing to do with the company or the organization in which
the trainer is currently working.

However in no circumstances neither the Trainer nor SecurityXploded is responsible for any
damage or loss caused due to use or misuse of the information presented here.




                                        www.SecurityXploded.com
Acknowledgement
 Special thanks to Null community for their extended support and co-operation.


 Special thanks to ThoughtWorks for the beautiful venue.


 Thanks to all the trainers who have devoted their precious time and countless hours to make it
  happen.




                                        www.SecurityXploded.com
Advanced Malware Analysis Training

  This presentation is part of our Advanced Malware Analysis Training program. Currently it
  is delivered only during our local meets for FREE of cost.




For complete details of this course, visit our Security Training page.

                                             www.SecurityXploded.com
Who Are We?
Nagareshwar
     Founder of SecurityXploded
     Reversing, Malware Analysis, Crypto, Secure Coding
     Twitter: @tnagareshwar


Monnappa
     Info Security Investigator @ Cisco
     Member of SecurityXploded (SX)
     Reverse Engineering, Malware Analysis, Memory Forensics
     Twitter: @monnappa22


                                      www.SecurityXploded.com
Part I

The Trailer
 (by Nagareshwar)




     www.SecurityXploded.com
Contents of Part 1
   What is Virus/Malware/Worm

   Symptoms of Infection

   Agent in Action

   Last Resort

   Anti-Malware Tips




                                 www.SecurityXploded.com
What is Virus/Malware/Worm ?

   Malware: Software written for malicious purposes
        - destroy data, steal money, annoy users

   Virus: Malware which requires human intervention to spread
         - require user to click on the exe, open a document or visit a website


   Worm: Malware which can spread automatically
       - automatically infect other systems in the network
       - spreads through plug & play devices




                                            www.SecurityXploded.com
Symptoms of Infection

   Unusual Behaviour in Applications

   System Slowdown

   (Suddenly) Laptop Getting Heated Heavily

   Password Change/Reset Emails for your Bank or Online Accounts

   Surprise Financial Transactions on your Credit Cards 




                                        www.SecurityXploded.com
Agent in Action
   Full Anti-virus Scan (manual)

      - detect known malwares if any

   Rootkit Scan

    - GMER, SpyDLLRemover (helps in removal of malware DLLs)

   Scan the Infected or Suspicious file with VirusTotal

     - Get the name of virus/malware family

     - Use VirusTotal Scanner Tool for quick scan

   Check with AV sites like McAfee, Symantec for the detected Malware

     - to understand infection details or for any removal steps



                                              www.SecurityXploded.com
Agent in Action (contd)
    BHO Scan (System Slowdown)
    - Run SpyBHORemover and disable unusable BHOs



    Delete Locked/Hidden/Protected Malware Files

    - Use GMER to delete Hidden Files/Registry Keys
    - Boot with BackTrack, mount your drives and delete the files/registry keys



    Change Passwords of Bank & other important accounts
    - Facebook, Google, Twitter, PayPal etc.




                                                     www.SecurityXploded.com
Rootkit Scan using GMER




          www.SecurityXploded.com
Remove Malware DLLs using SpyDLLRemover




                www.SecurityXploded.com
VirusTotal Scanner Tool




         www.SecurityXploded.com
Remove BHOs using SpyBHORemover




              www.SecurityXploded.com
Threat Report on Virus




         www.SecurityXploded.com
Last Resort

In case of full system or widespread infections,

    System Restore to ‘Right Restore Point’
    - look at the dates of infected files and it should give you right date to restore from


   Format and Re-install OS
    - clean-up other drives if necessary


   Scan other systems/devices in your Network
    - Your laptops, office systems or friends system may be infected as well




                                                        www.SecurityXploded.com
Anti-Malware Tips

   Never Trust your AntiVirus for Full Protection
    - It cannot detect advanced virus especially rootkit oriented ones,
    - Smart virus can disable AV auto protection silently giving you false sense of security


   Always Scan any EXE with VirusTotal
    - scan files downloaded from Internet and even files sent by close friends
    - Use VirusTotal Scanner for quick scan


   Disable AutoRun
    - most malwares use this mechanism spread very effectively
    - prevent getting infected through USB stick and stop it from spreading




                                                      www.SecurityXploded.com
Anti-Malware Tips (contd)

   Keep tab on your Startup programs
    - Use HijackThis or AutoRuns from SysInternals


   Monitor Worms coming through Network
    - Use NetShareMonitor


   Backup your Critical Files Periodically
    - One who Laughs last is the one who had the backup :)




                                                     www.SecurityXploded.com
Part II

The Real Show
   (by Monnappa)




     www.SecurityXploded.com
Contents of Part 2
   Detection and Removal

   Persistent Mechanism

   Demo 1

   Demo 2

   Demo 3

   Demo 4



                            www.SecurityXploded.com
Detection and Removal
1) Isolate the system from the rest of the network

2) Look for suspicious file, process, network and registry values

3) Identify the file generating the suspicious activity

4) Isolate the suspicious file

5) verify if the file is malicious

6) Identify the persistence mechanism

7) Break its persistence mechanism

8) Delete the malicious files from the system

9) monitor for suspicious activities (repeat step 2 to step 8)




                                                 www.SecurityXploded.com
Persistent mechanism
Below are some of the persistent mechanism used by malware:
1) Run Registry key

2) Appinit_DLL’s

3) WinLogon Notify

4) Runs as Service

5) Service DLL

6) BHO




                                 www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious Process
Process explorer shows suspicious process on192.168.1.100




                                        www.SecurityXploded.com
Persistence Mechanism
Registers the malicious executable in the “Run” registry key, to survive reboot




                                            www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the Persistence
Deleting the registry value removes the persistence mechanism used by the malware




                                         www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious Process
Process explorer shows suspicious process on192.168.1.100




                                        www.SecurityXploded.com
Persistence Mechanism
Malware runs as service which is set to auto-start




                                           www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the Persistence
Deleting the registry value removes the persistence mechanism used by the malware




                                         www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious Process
Below screenshot shows svchost.exe (pid 1052) making connections on port 80




                                        www.SecurityXploded.com
Persistence Mechanism
Malware installs a service DLL under the “netsvcs” svchost group




                                          www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the Persistence
Deleting the registry key removes the persistence mechanism used by the malware




                                        www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious Process Activity
Shows iexplore.exe making connections on port 80 (even though iexplore.exe was not run manually)




                                         www.SecurityXploded.com
Persistence Mechanism
Malware installs Appinit DLL which loads the DLL into all the process which loads user32.dll




                                           www.SecurityXploded.com
Persistence Mechanism (contd)
Malware hooks to the winlogon event




                                      www.SecurityXploded.com
VirusTotal Results
Suspicious files were confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the Persistence
Deleting the registry key removes the persistence mechanism used by the malware




                                        www.SecurityXploded.com
Removal
Deleting both the malicious files to remove the malware from the system




                                          www.SecurityXploded.com
Reference
Complete Reference Guide for Advanced Malware Analysis Training
[Include links for all the Demos & Tools]




                                            www.SecurityXploded.com
Thank You !



www.SecurityXploded.com




       www.SecurityXploded.com

Contenu connexe

Tendances

Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Androidsecurityxploded
 
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]securityxploded
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internalssecurityxploded
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...securityxploded
 
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis TechniquesAdvanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniquessecurityxploded
 
Reversing & malware analysis training part 3 windows pe file format basics
Reversing & malware analysis training part 3   windows pe file format basicsReversing & malware analysis training part 3   windows pe file format basics
Reversing & malware analysis training part 3 windows pe file format basicssecurityxploded
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmapsecurityxploded
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memorysecurityxploded
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsCysinfo Cyber Security Community
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Cysinfo Cyber Security Community
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malwaresecurityxploded
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualizationsecurityxploded
 
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwaresAdvanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwaresCysinfo Cyber Security Community
 
Advanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidAdvanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidCysinfo Cyber Security Community
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsCysinfo Cyber Security Community
 
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)securityxploded
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysisAbdulrahman Bassam
 

Tendances (20)

Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Android
 
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internals
 
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and CountermeasuresAnti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis TechniquesAdvanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
 
Reversing & malware analysis training part 3 windows pe file format basics
Reversing & malware analysis training part 3   windows pe file format basicsReversing & malware analysis training part 3   windows pe file format basics
Reversing & malware analysis training part 3 windows pe file format basics
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensics
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malware
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwaresAdvanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwares
 
Advanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidAdvanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to android
 
Anatomy of Exploit Kits
Anatomy of Exploit KitsAnatomy of Exploit Kits
Anatomy of Exploit Kits
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basics
 
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
 
Return address
Return addressReturn address
Return address
 

Similaire à Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares

Advanced Malware Analysis Training - Detection and Removal of Malwares
Advanced Malware Analysis Training - Detection and Removal of MalwaresAdvanced Malware Analysis Training - Detection and Removal of Malwares
Advanced Malware Analysis Training - Detection and Removal of Malwaresn|u - The Open Security Community
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisCysinfo Cyber Security Community
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware LabDigit Oktavianto
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.comgerryfebre
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.comkingh05
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 

Similaire à Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares (20)

Advanced Malware Analysis Training - Detection and Removal of Malwares
Advanced Malware Analysis Training - Detection and Removal of MalwaresAdvanced Malware Analysis Training - Detection and Removal of Malwares
Advanced Malware Analysis Training - Detection and Removal of Malwares
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Automating malware analysis
Automating malware analysis Automating malware analysis
Automating malware analysis
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Malware
MalwareMalware
Malware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysis
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware Lab
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 

Plus de securityxploded

Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutionssecurityxploded
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tacticssecurityxploded
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learningsecurityxploded
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 
Linux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon SandboxLinux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon Sandboxsecurityxploded
 
Automating Malware Analysis
Automating Malware AnalysisAutomating Malware Analysis
Automating Malware Analysissecurityxploded
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryptionsecurityxploded
 
Return Address – The Silver Bullet
Return Address – The Silver BulletReturn Address – The Silver Bullet
Return Address – The Silver Bulletsecurityxploded
 
Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)securityxploded
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensicssecurityxploded
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learningsecurityxploded
 
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14securityxploded
 

Plus de securityxploded (19)

Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
 
Buffer Overflow Attacks
Buffer Overflow AttacksBuffer Overflow Attacks
Buffer Overflow Attacks
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Linux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon SandboxLinux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon Sandbox
 
Introduction to SMPC
Introduction to SMPCIntroduction to SMPC
Introduction to SMPC
 
Breaking into hospitals
Breaking into hospitalsBreaking into hospitals
Breaking into hospitals
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Automating Malware Analysis
Automating Malware AnalysisAutomating Malware Analysis
Automating Malware Analysis
 
DLL Preloading Attack
DLL Preloading AttackDLL Preloading Attack
DLL Preloading Attack
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Return Address – The Silver Bullet
Return Address – The Silver BulletReturn Address – The Silver Bullet
Return Address – The Silver Bullet
 
Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
MalwareNet Project
MalwareNet ProjectMalwareNet Project
MalwareNet Project
 
Dissecting BetaBot
Dissecting BetaBotDissecting BetaBot
Dissecting BetaBot
 
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares

  • 1. Advanced Malware Analysis Training Series www.SecurityXploded.com
  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the Trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to Null community for their extended support and co-operation.  Special thanks to ThoughtWorks for the beautiful venue.  Thanks to all the trainers who have devoted their precious time and countless hours to make it happen. www.SecurityXploded.com
  • 4. Advanced Malware Analysis Training This presentation is part of our Advanced Malware Analysis Training program. Currently it is delivered only during our local meets for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who Are We? Nagareshwar  Founder of SecurityXploded  Reversing, Malware Analysis, Crypto, Secure Coding  Twitter: @tnagareshwar Monnappa  Info Security Investigator @ Cisco  Member of SecurityXploded (SX)  Reverse Engineering, Malware Analysis, Memory Forensics  Twitter: @monnappa22 www.SecurityXploded.com
  • 6. Part I The Trailer (by Nagareshwar) www.SecurityXploded.com
  • 7. Contents of Part 1  What is Virus/Malware/Worm  Symptoms of Infection  Agent in Action  Last Resort  Anti-Malware Tips www.SecurityXploded.com
  • 8. What is Virus/Malware/Worm ?  Malware: Software written for malicious purposes - destroy data, steal money, annoy users  Virus: Malware which requires human intervention to spread - require user to click on the exe, open a document or visit a website  Worm: Malware which can spread automatically - automatically infect other systems in the network - spreads through plug & play devices www.SecurityXploded.com
  • 9. Symptoms of Infection  Unusual Behaviour in Applications  System Slowdown  (Suddenly) Laptop Getting Heated Heavily  Password Change/Reset Emails for your Bank or Online Accounts  Surprise Financial Transactions on your Credit Cards  www.SecurityXploded.com
  • 10. Agent in Action  Full Anti-virus Scan (manual) - detect known malwares if any  Rootkit Scan - GMER, SpyDLLRemover (helps in removal of malware DLLs)  Scan the Infected or Suspicious file with VirusTotal - Get the name of virus/malware family - Use VirusTotal Scanner Tool for quick scan  Check with AV sites like McAfee, Symantec for the detected Malware - to understand infection details or for any removal steps www.SecurityXploded.com
  • 11. Agent in Action (contd)  BHO Scan (System Slowdown) - Run SpyBHORemover and disable unusable BHOs  Delete Locked/Hidden/Protected Malware Files - Use GMER to delete Hidden Files/Registry Keys - Boot with BackTrack, mount your drives and delete the files/registry keys  Change Passwords of Bank & other important accounts - Facebook, Google, Twitter, PayPal etc. www.SecurityXploded.com
  • 12. Rootkit Scan using GMER www.SecurityXploded.com
  • 13. Remove Malware DLLs using SpyDLLRemover www.SecurityXploded.com
  • 14. VirusTotal Scanner Tool www.SecurityXploded.com
  • 15. Remove BHOs using SpyBHORemover www.SecurityXploded.com
  • 16. Threat Report on Virus www.SecurityXploded.com
  • 17. Last Resort In case of full system or widespread infections,  System Restore to ‘Right Restore Point’ - look at the dates of infected files and it should give you right date to restore from  Format and Re-install OS - clean-up other drives if necessary  Scan other systems/devices in your Network - Your laptops, office systems or friends system may be infected as well www.SecurityXploded.com
  • 18. Anti-Malware Tips  Never Trust your AntiVirus for Full Protection - It cannot detect advanced virus especially rootkit oriented ones, - Smart virus can disable AV auto protection silently giving you false sense of security  Always Scan any EXE with VirusTotal - scan files downloaded from Internet and even files sent by close friends - Use VirusTotal Scanner for quick scan  Disable AutoRun - most malwares use this mechanism spread very effectively - prevent getting infected through USB stick and stop it from spreading www.SecurityXploded.com
  • 19. Anti-Malware Tips (contd)  Keep tab on your Startup programs - Use HijackThis or AutoRuns from SysInternals  Monitor Worms coming through Network - Use NetShareMonitor  Backup your Critical Files Periodically - One who Laughs last is the one who had the backup :) www.SecurityXploded.com
  • 20. Part II The Real Show (by Monnappa) www.SecurityXploded.com
  • 21. Contents of Part 2  Detection and Removal  Persistent Mechanism  Demo 1  Demo 2  Demo 3  Demo 4 www.SecurityXploded.com
  • 22. Detection and Removal 1) Isolate the system from the rest of the network 2) Look for suspicious file, process, network and registry values 3) Identify the file generating the suspicious activity 4) Isolate the suspicious file 5) verify if the file is malicious 6) Identify the persistence mechanism 7) Break its persistence mechanism 8) Delete the malicious files from the system 9) monitor for suspicious activities (repeat step 2 to step 8) www.SecurityXploded.com
  • 23. Persistent mechanism Below are some of the persistent mechanism used by malware: 1) Run Registry key 2) Appinit_DLL’s 3) WinLogon Notify 4) Runs as Service 5) Service DLL 6) BHO www.SecurityXploded.com
  • 24.
  • 25. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 26. Suspicious Process Process explorer shows suspicious process on192.168.1.100 www.SecurityXploded.com
  • 27. Persistence Mechanism Registers the malicious executable in the “Run” registry key, to survive reboot www.SecurityXploded.com
  • 28. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 29. Breaking the Persistence Deleting the registry value removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 30. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 31.
  • 32. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 33. Suspicious Process Process explorer shows suspicious process on192.168.1.100 www.SecurityXploded.com
  • 34. Persistence Mechanism Malware runs as service which is set to auto-start www.SecurityXploded.com
  • 35. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 36. Breaking the Persistence Deleting the registry value removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 37. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 38.
  • 39. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 40. Suspicious Process Below screenshot shows svchost.exe (pid 1052) making connections on port 80 www.SecurityXploded.com
  • 41. Persistence Mechanism Malware installs a service DLL under the “netsvcs” svchost group www.SecurityXploded.com
  • 42. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 43. Breaking the Persistence Deleting the registry key removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 44. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 45.
  • 46. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 47. Suspicious Process Activity Shows iexplore.exe making connections on port 80 (even though iexplore.exe was not run manually) www.SecurityXploded.com
  • 48. Persistence Mechanism Malware installs Appinit DLL which loads the DLL into all the process which loads user32.dll www.SecurityXploded.com
  • 49. Persistence Mechanism (contd) Malware hooks to the winlogon event www.SecurityXploded.com
  • 50. VirusTotal Results Suspicious files were confirmed to be malicious www.SecurityXploded.com
  • 51. Breaking the Persistence Deleting the registry key removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 52. Removal Deleting both the malicious files to remove the malware from the system www.SecurityXploded.com
  • 53. Reference Complete Reference Guide for Advanced Malware Analysis Training [Include links for all the Demos & Tools] www.SecurityXploded.com
  • 54. Thank You ! www.SecurityXploded.com www.SecurityXploded.com