[WiP] Practical Malware Analysis - Labs Writeup - Lab 3
Chapter 3
Note on VM Setup:
For Lab 3 of Practical Malware Analysis, my initial analysis environment consisted of a Windows 10 virtual machine configured with FLARE VM.
However, during the course of the lab, I encountered malware samples that were packed with UPX and designed to run specifically on older Windows systems—namely Windows XP. Furthermore, the lab exercises required dynamic analysis, including running the samples to observe their behavior, something that became problematic in the modern FLARE VM environment due to compatibility issues.
To address these issues, I set up a Windows XP virtual machine dedicated to (partial) dynamic malware analysis.
Lab 3-1:
Hashes:
!!!
Question 1: What are this malware’s imports and strings?
Imports:
Only ExitProcess from kernel32.dll is exposed at this point. (PEiD suggests that binary might be packed with PEncrypt 3.1 Final).
Assumptions based on static analysis:
- Dropped vmx32to64.exe (?)
- WinVMX32-mutex (?) After dynamic analysis:
Question 3: Are there any useful network-based signatures for this malware? If so, what are they?
Based on Basic Static Analysis: Reference to: www[.]practicalmalwareanalysis[.]com
Lab 3-2:
Hashes:
!!!!