官术网_书友最值得收藏!

Tools

Identifying the registry entry, files dropped, and running processes that are related to the malware requires tools. There are existing tools that we can use to extract these objects. There are two analysis events we should consider: analysis after the malware has been executed and analysis before the malware executes. Since our aim for this chapter is to extract components, we will discuss the tools that can help us find suspected files. Analysis tools that are used after we have extracted our suspected malware will be discussed in further chapters.

When a system has already been compromised, the analyst would need to use tools that can identify suspected files. Each suspected file will be analysed further. To start off, we can identify it based on persistence.

  1. List down all processes and their respective file information
  2. From the list of known registry persistence paths, look for entries containing the file paths
  3. Extract the suspected files

The above steps may require pre-existing tools from Microsoft Windows, such as:

  • The Registry Editor (regedit/regedt32) to search the registry
  • You can also use the command line for accessing the registry reg.exe, as seen in the following screenshot:   
  • Task manager (taskmgr) to list down the processes
  • Windows Explorer (explorer) or Command prompt (cmd) to traverse directories and retrieve the files. 

However, there are also third-party  tools that we can use that can help us list down suspected files. Here are a few we will briefly discuss:

  • Autoruns
  • Process explorer
主站蜘蛛池模板: 东至县| 辽宁省| 武夷山市| 汉阴县| 无为县| 陕西省| 瑞丽市| 桃源县| 武清区| 湖北省| 锡林浩特市| 调兵山市| 彰武县| 阿克陶县| 恩平市| 南郑县| 孝感市| 浦县| 永寿县| 伊宁县| 晋宁县| 玛沁县| 湖州市| 孝昌县| 离岛区| 阜城县| 萨迦县| 綦江县| 宾阳县| 乌拉特后旗| 五寨县| 张家川| 威宁| 绥江县| 新化县| 兴城市| 民勤县| 博兴县| 米林县| 安徽省| 平罗县|