|
Dec 26, 2024
|
|
|
|
CVF 2202 - Malicious Documents and Memory Forensics Credits: 3 Hours/Week: Lecture 2 Lab 2 Course Description: This course explores several techniques malware authors commonly employ to protect malicious Windows executables from being analyzed, often with the help of packers. The course deals with how to bypass analysis defenses, such as structured error handling for execution flow, PE header corruption, fake memory breakpoints, tool detection, integrity checks and timing controls. It touches on Web browser malware, the use of additional tools and approaches for analyzing more complex malicious scripts written in VBScript and JavaScript by exploring common patterns of assembly instructions often used to gain initial access to the victim’s computer, how to analyze malicious Microsoft Office documents, covering tools such as Office MalScanner and explore steps for analyzing malicious PDF documents with utilities such as Origami and PDF Tools. MnTC Goals None
Prerequisite(s): CVF 1065 with a grade of C or higher or instructor consent. Corequisite(s): None Recommendation: CVF 2201 with a grade of C or higher.
Major Content
- Identifying packers
- Manual unpacking of packed and otherwise protected malicious Windows executables
- Tips and tricks for bypassing anti-analysis mechanisms built into malware
- Additional techniques for analyzing obfuscated browser scripts using tools such as SpiderMonkey
- Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) and Adobe PDF documents
- Examining shellcode in the context of malicious files
- Analyzing memory to assess malware characteristics and reconstruct infection artifacts
- Using memory forensics to analyze rootkit infections
Learning Outcomes At the end of this course students will be able to:
- describe IDA Plug-in architecture and setup.
- explain the Kernel API used by malware authors.
- use IDA configuration for programmatic reversing and script writing.
- describe common rootkit technologies.
- use WinDBG for kernel debugging.
- explain PE Anti-reversing techniques: De-obfuscating executables for IDA.
- explain user-mode obfuscation methods.
- demonstrate Anti-RE Techniques: Detecting debuggers, virtual machines, and other tricks.
- describe kernel assisted obfuscation.
- describe rootkit process / DLL injection.
- explain rootkit process / DLL injection.
- analyze reverse kernel-mode botnet bots.
- describe Metasploit’s Shikata-ga-nai.
- utilize Saffron and Ether during malware analysis.
- analyze physical memory with memorize.
- identify common algorithms inside worms.
- analyze Virtual Machine based packers.
- describe reverse Themida and other VM packers.
- demonstrate reverse storm’s C&C protocol.
- demonstrate reverse .NET byte code.
Competency 1 (1-6) None Competency 2 (7-10) None Courses and Registration
Add to Portfolio (opens a new window)
|
|