SlideShare a Scribd company logo
1 of 10
Download to read offline
Basic Static Malware Analysis
AIM: Perform Basic Static Analysis on Bot malware sample
Description:
Static Malware Analysis is helping to understanding about is malware information
file unpack, file Signature, effected import/Export function, extracting string.
Malware Threat without execute we can analyse file is called “Static Malware
Analysis”. Best and challenge area in cyber security filed is malware analysis, before going
to malware analysis should learn about file structures, function default dll in windows
system, how to collect import string, where it is.
Requirements:
 Windows xp (sample Analysis easy to basic)
 Malware sample analysis tools
 Malware sample
Procedure:
Step_1. However, file analysis most importance, before executing file create isolation
environment for in a system like connection less or host-only mode in virtual
machines. VMware Workstation provided snapshot option its help to more effective
to malware analysis then start executing malware take clean and safe snapshot take
from workstation. Next snapshot is creating after all malware samples and tools
copied in virtual machine.
Step_2. we need first screenshot is explain about windows xp system ready and what
does environment explain each control is where in.
Step_3. Now, copied all Malware Sample and Malware Analysis have in my hand.
Now Ready to take Another Snapshot for before Analysis
name(Malware_Testing_Enviorment)
Figure 1 Windows System xp Ready, cleaned vm
Figure 2 Look at screenshot, give path now to take snapshot
Figure 3 After Malware Sample copied take snapshot (Malware_Testing_Enviorment)
Step_4. Yes, Some times execute malware without we knowing change registry
values, than I plan take registry shot using regshot tool saved output in a system
Figure 4 Regshot 32bit ansi run execute
Figure 5 Registry 1st snapshot takes and saved location
Figure 6saved registry hive file
Figure 7 completed save path now start malware analysis
Step_5. Now, Malware sample look at the time exe file, name is bot.exe. This file is
packed with obfuscation method Weather applied or normalized file can analysis
based on the tool “PEiD “
Above Figure PEiD tool help to understand about file first offset, size of the file and
importance unpacked file analysis here Message display “Nothing found”. Most of
Figure 9 Malware Sample File(bot.exe)
Figure 8 PEiD Tool here uploaded, nothing packed file Here
the criminal (Attacker) hide information about malicious file at the time used
packing method, upx tool help to pack the exe file.
Step_6. Now, Next step we analysis the file PE structure Using pe view tool, this tool
given useful information like (file is exe Is really or not). Sample malware(bot.exe)
upload into peview tool information look like screenshot
This Screenshot given information about pe file lift side panel pe structure format tree
information, Right side panel in details information given to analyst.
Pe structure first identify Pe header we identify windows platform signature”
Image_dos_signature MZ ” ,Subprogram “”
Step_7. Next MS-Dos sub program here we identify once here MZ Standard
Figure 10 Lift side panel tree, right side pe file information
Figure 11 mz analysis
Step_8. Here we identify image signature pe
Pe Signature new technologies file system execute is”Image_NT_Signtature PE”
Step_9. File Header information most importance information running window
platform, first complier date and time, machine type
We analysis machine “Window ---IMAGE_FILE_MACHINE DOS”, Time Date
stamp”2011/04/14 Thu”, Windows system 32bit platform
Figure 12 Image file Header most use full information
Step_10. Section text importance import Address tables, This file change some
function effected areas are Registry, process create, control release. here thinks
more function process create and registry change.
Best analysis gets internal code function, used import class function help internal
data code.
Step_11. This
Window network dll is help understand is file connection form window system.
Figure 13 Import class understand funciton
Figure 14 winnet dll function
Step_12. Effective directory dll
ds
Figure 16 dell effective are
Figure 15 crypt32 dll
Step_13. We
Step_14. sdf
Ds
ds
Conclusion:
Peview, peid, regshot used to test basic malware analysis part one completed

More Related Content

Similar to Basic Static Malware Analysis.pdf

Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysisAbdulrahman Bassam
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisCysinfo Cyber Security Community
 
Malware analysis
Malware analysisMalware analysis
Malware analysisDen Iir
 
Chapter08-OS.ppt
Chapter08-OS.pptChapter08-OS.ppt
Chapter08-OS.pptyonas771772
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility programDhani Ahmad
 
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 DeploymentsTDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 Deploymentsjimboks
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programmebbp2067
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadAzad Mzuri
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...IJNSA Journal
 
Runtime potential updater file(s) identification does your software updates a...
Runtime potential updater file(s) identification does your software updates a...Runtime potential updater file(s) identification does your software updates a...
Runtime potential updater file(s) identification does your software updates a...IJNSA Journal
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Uploading files using selenium web driver
Uploading files using selenium web driverUploading files using selenium web driver
Uploading files using selenium web driverPankaj Biswas
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Batch File Virus Project Technical Paper
Batch File Virus Project Technical PaperBatch File Virus Project Technical Paper
Batch File Virus Project Technical PaperStephen Whisman
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 

Similar to Basic Static Malware Analysis.pdf (20)

Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysis
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Chapter08-OS.ppt
Chapter08-OS.pptChapter08-OS.ppt
Chapter08-OS.ppt
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility program
 
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 DeploymentsTDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by Azad
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Dense And Hot 360 Flex
Dense And Hot 360 FlexDense And Hot 360 Flex
Dense And Hot 360 Flex
 
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...
RUNTIME POTENTIAL UPDATER FILE(S) IDENTIFICATION: DOES YOUR SOFTWARE UPDATES ...
 
Runtime potential updater file(s) identification does your software updates a...
Runtime potential updater file(s) identification does your software updates a...Runtime potential updater file(s) identification does your software updates a...
Runtime potential updater file(s) identification does your software updates a...
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Uploading files using selenium web driver
Uploading files using selenium web driverUploading files using selenium web driver
Uploading files using selenium web driver
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Batch File Virus Project Technical Paper
Batch File Virus Project Technical PaperBatch File Virus Project Technical Paper
Batch File Virus Project Technical Paper
 
Chapter08
Chapter08Chapter08
Chapter08
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Dense And Hot Web Du
Dense And Hot  Web DuDense And Hot  Web Du
Dense And Hot Web Du
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Basic Static Malware Analysis.pdf

  • 1. Basic Static Malware Analysis AIM: Perform Basic Static Analysis on Bot malware sample Description: Static Malware Analysis is helping to understanding about is malware information file unpack, file Signature, effected import/Export function, extracting string. Malware Threat without execute we can analyse file is called “Static Malware Analysis”. Best and challenge area in cyber security filed is malware analysis, before going to malware analysis should learn about file structures, function default dll in windows system, how to collect import string, where it is. Requirements:  Windows xp (sample Analysis easy to basic)  Malware sample analysis tools  Malware sample Procedure: Step_1. However, file analysis most importance, before executing file create isolation environment for in a system like connection less or host-only mode in virtual machines. VMware Workstation provided snapshot option its help to more effective to malware analysis then start executing malware take clean and safe snapshot take from workstation. Next snapshot is creating after all malware samples and tools copied in virtual machine. Step_2. we need first screenshot is explain about windows xp system ready and what does environment explain each control is where in.
  • 2. Step_3. Now, copied all Malware Sample and Malware Analysis have in my hand. Now Ready to take Another Snapshot for before Analysis name(Malware_Testing_Enviorment) Figure 1 Windows System xp Ready, cleaned vm Figure 2 Look at screenshot, give path now to take snapshot Figure 3 After Malware Sample copied take snapshot (Malware_Testing_Enviorment)
  • 3. Step_4. Yes, Some times execute malware without we knowing change registry values, than I plan take registry shot using regshot tool saved output in a system Figure 4 Regshot 32bit ansi run execute Figure 5 Registry 1st snapshot takes and saved location
  • 4. Figure 6saved registry hive file Figure 7 completed save path now start malware analysis
  • 5. Step_5. Now, Malware sample look at the time exe file, name is bot.exe. This file is packed with obfuscation method Weather applied or normalized file can analysis based on the tool “PEiD “ Above Figure PEiD tool help to understand about file first offset, size of the file and importance unpacked file analysis here Message display “Nothing found”. Most of Figure 9 Malware Sample File(bot.exe) Figure 8 PEiD Tool here uploaded, nothing packed file Here
  • 6. the criminal (Attacker) hide information about malicious file at the time used packing method, upx tool help to pack the exe file. Step_6. Now, Next step we analysis the file PE structure Using pe view tool, this tool given useful information like (file is exe Is really or not). Sample malware(bot.exe) upload into peview tool information look like screenshot This Screenshot given information about pe file lift side panel pe structure format tree information, Right side panel in details information given to analyst. Pe structure first identify Pe header we identify windows platform signature” Image_dos_signature MZ ” ,Subprogram “” Step_7. Next MS-Dos sub program here we identify once here MZ Standard Figure 10 Lift side panel tree, right side pe file information Figure 11 mz analysis
  • 7. Step_8. Here we identify image signature pe Pe Signature new technologies file system execute is”Image_NT_Signtature PE” Step_9. File Header information most importance information running window platform, first complier date and time, machine type We analysis machine “Window ---IMAGE_FILE_MACHINE DOS”, Time Date stamp”2011/04/14 Thu”, Windows system 32bit platform Figure 12 Image file Header most use full information
  • 8. Step_10. Section text importance import Address tables, This file change some function effected areas are Registry, process create, control release. here thinks more function process create and registry change. Best analysis gets internal code function, used import class function help internal data code. Step_11. This Window network dll is help understand is file connection form window system. Figure 13 Import class understand funciton Figure 14 winnet dll function
  • 9. Step_12. Effective directory dll ds Figure 16 dell effective are Figure 15 crypt32 dll
  • 10. Step_13. We Step_14. sdf Ds ds Conclusion: Peview, peid, regshot used to test basic malware analysis part one completed