Example of a complete analysis
Static analysis
Loading the file into PEID
List of sections
Here we can see that there are resources inside the binary.
Strings in the binary
The svchost.exe
string in a binary is not usual.
Extracting resources
Note that the extracted resource contains a lot of 0x41
. Perhaps a xor is performed to hide the resources.
DependencyWalker Imports
Dynamic analysis
Procmon in capture
Regshot 1/2
Before launching the binary, you need to do a first shot with RegShot to get a fingerprint of the Windows registry and see which ones have been modified.
Regshot 2/2
Here we have all registry that have been modified or added during the process execution.
Process explorer
On the process explorer capture, we can see that after we started the malware, a new process called svchost.exe
was also started.
Comparing strings
When comparing strings present in the binary and strings present in memory, we can see that they are not the same.
Strings in memory look like keyboard keys. There is also a log file name. Could it be a keylogger?
Execution
During the execution, we can see that the svchost.exe
process is created and that nothing is going through the network (the wireshark window stays empty).
While our infected svchost.exe
continues to run, let's relaunch procmon and filter on the infected PID. And let's write to a notepad. We can see some operations such as CreateFile
, WriteFile
, CloseFile
...
You can find the path where the registered keyboard keys are located.
Content of the created log file.