Skip to content

Latest commit

 

History

History
48 lines (26 loc) · 1.88 KB

lab-12-1.md

File metadata and controls

48 lines (26 loc) · 1.88 KB

This post is part of the series of Practical Malware Analysis Exercises.

1) What happens when you run the malware executable?

When the EXE is run from the command line, without arguments, a message box pops up with the title Practical Malware Analysis 0 and the text Press OK to reboot. Clicked on it, and nothing happens. Each minute, the same message box appears with the title Practical Malware Analysis X, where X is an incremented counter.

pma12.1_popup

In Process Explorer the CPU usage for Interrupts is up between 65-85%.

2) What process is being injected?

Running strings against the EXE shows explorer.exe and Lab12-01.dll. Searching for the handle Lab in Process Explorer gets a single hit on explorer.exe.

pma12.1_handle

3) How can you make the malware stop the pop-ups?

Restarting the computer stops the malware. It doesn't have a persistence mechanism.

4) How does this malware operate?

The EXE starts by loading psapi.dll, and getting the process addresses for EnumProcessModules, GetModuleBaseNameA, and EnumProcesses. Then, it iterates through the processes looking for explorer.exe.

When the EXE discovers explorer.exe, it performs DLL injection, forcing the target to load Lab12-01.dll into a new thread from disk.

pma12.1_inject

The DLL just creates a parent thread, that launches a child thread once per minute, which shows the message box. This will happen until stopped.