This post is part of the series of Practical Malware Analysis Exercises.
When the EXE is run from the command line, without arguments, a message box pops up
with the title Practical Malware Analysis 0
and the text Press OK to reboot.
Clicked
on it, and nothing happens. Each minute, the same message box appears with the title
Practical Malware Analysis X
, where X is an incremented counter.
In Process Explorer the CPU usage for Interrupts is up between 65-85%.
Running strings against the EXE shows explorer.exe
and Lab12-01.dll
. Searching
for the handle Lab
in Process Explorer gets a single hit on explorer.exe
.
Restarting the computer stops the malware. It doesn't have a persistence mechanism.
The EXE starts by loading
psapi.dll, and getting the process addresses for
EnumProcessModules,
GetModuleBaseNameA,
and EnumProcesses.
Then, it iterates through the processes looking for explorer.exe
.
When the EXE discovers explorer.exe
, it performs DLL injection, forcing the target to load Lab12-01.dll
into a new thread from disk.
The DLL just creates a parent thread, that launches a child thread once per minute, which shows the message box. This will happen until stopped.