Practical Malware Analysis — Chapter 3— Basic Dynamic Analysis

Sandboxes: The Quick & Dirty Approach

Running Malware

C:\>rundll32.exe DLLname, Export arguments

Install
Uninstall

C:\>rundll32.exe rip.dll, Install

C:\>rundll32.exe xyzzy.dll, #5

C:\>rundll32 ipr32x.dll,InstallService ServiceName
C:\>net start ServiceName

Monitoring with Process Monitor

Monitoring with Process Explorer

Using Dependency Walker

Comparing Registry Snapshots with Regshot

Faking a Network

Basic Dynamic Tools in Practice

NOTE

Conclusion

--

--

--

Malware/RE/Firmware Analysis, App Sec/Off Sec, VAPT, Phishing Simulations/SE | Risk Management, IS Governance, Audits, ISO 27001 LI

Love podcasts or audiobooks? Learn on the go with our new app.

What is Law Blocks ?

Ethical Hacking Is Far From Ethical or Legal

{UPDATE} Shooting Game 3D - Best Sniper Hack Free Resources Generator

{UPDATE} Against the Clock Hack Free Resources Generator

Enumerate Credentials stored in Azure AD Connect and on a Domain Controller

CryptoExplore: Your Guide Through Crypto & Web3

{UPDATE} Battle City 3D Hack Free Resources Generator

크립토닷컴이 UFC 파이트 키트 AR 필터 캠페인을 통해 $100 UFC 공식 스토어 기프트 코드 증정합니다.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Kamran Saifullah

Kamran Saifullah

Malware/RE/Firmware Analysis, App Sec/Off Sec, VAPT, Phishing Simulations/SE | Risk Management, IS Governance, Audits, ISO 27001 LI

More from Medium

Invoca Capture the Flag (CTF) 2022

Invoca CTF Logo

Detecting CVE-2022–30190 “Follina”

Security Series: Threat Modeling 3 — Documentation and Deployment

Detail Description about SPF Records