Part 3 - Dynamic Analysis

Video Activity

This lesson covers dynamic analysis, which allows us to study a program as it executes. Tools for dynamic analysis include: · Procmon · Process explorer · Regshot · ApateDNS In addition, participants learn about submitting virus information.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

7 hours 26 minutes
Video Description

This lesson covers dynamic analysis, which allows us to study a program as it executes. Tools for dynamic analysis include: · Procmon · Process explorer · Regshot · ApateDNS In addition, participants learn about submitting virus information.

Video Transcription
blooming on from our general static analysis, we go two net step of dynamic analysis
and with static analysis, weaken studied the program without actually executing, so that that's what makes it step.
And then
the tools of the trade that we're going to use within the static analysis would want to have our disassemble hours. We're gonna have our d compilers. We're gonna look at the source code analyzers, and then we're gonna use basic utilities like strings and grab
all of those things we can use to ecstatically look at that file without actually having to execute it.
One of the advantages of static analysis has is that it can reveal out program would behave under unusual circumstances.
And by unusual I mean that we can examine parts of the program that would normally not execute. That helps us get more information about that file.
those air unusual circumstances so dynamic analysis, we can study a program as it actually executes, and then with dynamic analysis, the tools of the trade that you're going to use for that dynamic analysis are going to be your deep buggers, your function called tracers,
your machine and new emulators
logic. analyzers and networks nippers, and the advantage of dynamic analysis is that it can also be fast and accurate. But it does have a lot of potential thio be destructive, especially if you're doing it on a system that is not a BM
or if you're doing it on the
a standalone laptop.
So some of the tools that we're gonna use for dynamic that analysis
our product monitor, process, monitor and Brockman is a free tool that's developed by Windows system internals. And it's used to monitor the Windows file system, registry and process activity real time.
So is your executing that malware You're going to be able to see some of those changes within that
within those processes?
The next thing that we're going to use for dynamic analysis is going to be our process explore
and with Process Explorer, it's going to monitor the running processes, and it will show you the handles and DLL ls there gonna be loaded for process. And that way you could kind of look at that and compare with your victim machine
and see if you can see find some of those commonalities with the handles on the D. L. Else that you might see on your test machine.
The next program that we're gonna talk about his red shot
and red shot is a open source utility to monitor your registry for changes and what's gonna happen. This is It's going to essentially take a snapshot of your registry
before you run this, uh,
this malware on your system. And then it's going to take a snapshot
as the malware runs. And that way you could compare foreign after and see what, if anything, has changed within your registry.
And then the last two were going to talk about
is a pate de NS but the pate de NS. It's a tool for controlling the NS responses on your system, and it's going to act a city in a server on. Then what? What that's gonna do is it will spook being. This response is generated by that malware. So those Air four programs that you can use
the rock that dynamic analysis to examine that file,
a zits being executed and to see exactly what it's going to do natively in the real world. And obviously again, you want to be doing this on your your V m and or your standalone machine?
Uh, one of the last things that we're gonna want to do after we have
kind of toward this file apart, examined at sea have seen what it does
is that you can kind of start to guard against these things. Essentially, can't fight something that you haven't defined or that you don't know exactly what it is, What it's not going to do.
Eso this whole
analyzing the processes of this malware from from the automated announce a static and dynamic you're getting information about that file on that information is gonna help you essentially determine what action you want to take next,
and and then that malware file that you're analyzing. It's also gonna help give you some type of idea about what may have done on your network.
Once you start the analysis process, you're gonna be able to find some commonalities with these malware files
that you're gonna look at that may have infected your network or machine on your network.
And some of those commonalities would include MP five ashes cold back I P addresses down motors, common file names, and then any of those you can configure your firewall to essentially block that.
So the more commonalities that you could find more specifically, you can protect your system to guard against those. Ah, lot of times I've seen, especially recently, malware writers will change a lot of the names of the flowers that they're sending.
They're gonna change the I P addresses
within the
the file itself. So it's gonna get a lot harder to try and block some of these things. So the analysis will help you try and identify very specific features and functions of this malware. That way, you could
set your configuration sittings in that fire, Walter, to catch it in the block it. Otherwise, you're gonna have to try and block 50 different email addresses. You're gonna have to block 50 different eye piece, and it's a lot of work.
So if you can analyze those files and get the specific information
that seems to be shared among all of those files, it will make your life a lot easier.
And then you can also send the files to your antivirus provider so you could receive updates to your antivirus definitions. But again, helping unpack that file, identify what you want tohave block and what you're trying to protect against
will also help your anti virus provider
create the right definition for you.
So this was a quick down and dirty of our malware analysis and malware remediation.
This is was not designed to essentially be a complete reverse engineering Mauer class. Uh, and I think we have one of those coming on the cyber website. So if you're interested in learning how to reverse engineer a marijuana, I would recommend definitely checking that out.
This was designed to provide you an overview
of what? Use an incident. Respond Ercan do toe look and analyze it. Some of that malware.
So what we talked about this from going from
least difficulty Most difficult, least difficult. It's going to be submitting that malware to an online
analysis tool like virus total, our malware dot com or some type of automated program that's gonna help identify what this piece of malware it's doing and that will help focus your efforts
moving up on that pyramid. We talked about static
analysis where you're kind of looking in that looking at that file for ways that it wouldn't necessarily run native
and what that will do that's going to help you identify some I p addresses. You are Els are some of the processes that might be created with that malware
above that level. We're going to have the dynamic analysis, and the dynamic analysis will help us look at the file as it actually runs on a system.
And the dynamic analysis will help us identify some of the changes that the program is going to make in the registry or some of the processes and dll that program's gonna forget.
all of those processes have their strengths and weaknesses, and those were some of the tools and techniques that you can use as you're beginning to investigate your malware.
And then once you find some of those commonalities for those Mauer files, you can then go about starting that remediation process, submitting those files to your antivirus providers and or changing or strengthening your firewall settings to try and prevent those files from coming in again.
So that concludes our section on malware analysis as it relates to incident response in advance. Forensics. I hope you enjoyed this course and come back next time. Our next video is going to talk about the remediation process for mountain,
so thank you. And I hope to see you again.
Up Next
Incident Response and Advanced Forensics

In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery.

Instructed By