Proj 3. Unpacking (15 pts)

What you need:

Malware Samples

This project uses files in this folder:

C:\Users\Administrator\Desktop\Practical Malware Analysis Labs\BinaryCollection\Chapter_1L

Examining the Strings in Lab01-02.exe with BinText

Examine the strings in Lab01-02.exe with BinText.

There are only a few strings, and they call only a few ordinary Windows API commands, as shown below.

These strings aren't from the malware--they are from the UPX packer, as we will show below.

Examining the File with PEiD

Run PEiD on the file. It shows that the file is packed with UPX, as shown in the "EP Section" below.

Examining the File with PEview

Run PEview on the file. The file has sections labeled UPX0, UPX1, and UPX2, as shown below.

These are section names produced by the UPX packer.

Unpacking the File with UPX

Open a Command Prompt window and execute this command:
UPX
You see a UPX help message, as shown below:

Execute these commands to move to the directory containing the malware samples, and list the files there:

cd "\Users\Administrator\Desktop\Practical Malware Analysis Labs\BinaryCollection\Chapter_1L"

DIR

You see several malware samples, including Lab01-02.exe, as shown below:

Execute these commands to unpack the file, and list the files again:

UPX -d -o Lab01-02-unpacked.exe Lab01-02.exe

DIR

The unpacked file is much larger than the original file, as shown below:

Analyze the unpacked file with PEiD. It now is regognized as a "Microsoft Visual C++ 6.0" file, as shown below.

On the left side of the PeID box, find the Entrypoint value, which is covered by a green box in the image above. Enter it in the form below to record your success.

Use the form below to record your score in Canvas.

3.1. Recording Your Success (10 pts.)

Use the form below to record your score in Canvas.

Name or Email:
Entrypoint (redacted in the image above):

Imports

Find the unpacked file's imports with Dependency Walker.

The imports from KERNEL32.DLL, ADVAPI32.DLL, and MSVCRT.DLL are uninformative generic functions used by almost every program.

However, the WININET.DLL imports are InternetOpenUrlA and InternetOpenA, as shown below. This indicates that the malware connects to a URL.

Strings

Find the strings in the unpacked file.

You should see the API names InternetOpenURLA and InternetOpenA, and the Command-and-Control URL http://www.malwareanalysisbook.com, as shown below.

These suggest that infected machines will connect to http://www.malwareanalysisbook.com. The name of the running service, MalService, is also visible.

The last string is covered by a green box in the image above. Enter it in the form below to record your success.

3.2. Recording Your Success (5 pts.)

Use the form below to record your score in Canvas.

Name or Email:
String (redacted in the image above):


Challenge 3.3: Find the Packer (10 pts)

Find the packer used for sample Lab01-03.exe.

Ignore everything except the primary packer name, which consists of three capital letters.

Enter it in the form below to record your success.

3.3. Recording Your Success (10 pts extra)

Use the form below to record your score in Canvas.

Name or Email:
Packer Name:


Posted 8-21-18
Chal 3.3 added 8-28-18
Chal 3.3 number fixed 9-11-18