SlideShare uma empresa Scribd logo
1 de 55
Baixar para ler offline
Advanced Malware Analysis Training Series




        www.SecurityXploded.com
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS" without
any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are
solely of the trainer’s only and nothing to do with the company or the organization in which
the trainer is currently working.

However in no circumstances neither the Trainer nor SecurityXploded is responsible for any
damage or loss caused due to use or misuse of the information presented here.




                                        www.SecurityXploded.com
Acknowledgement
 Special thanks to Null community for their extended support and co-operation.


 Special thanks to ThoughtWorks for the beautiful venue.


 Thanks to all the trainers who have devoted their precious time and countless hours to make it
  happen.




                                        www.SecurityXploded.com
Advanced Malware Analysis Training

  This presentation is part of our Advanced Malware Analysis Training program. Currently it
  is delivered only during our local meets for FREE of cost.




For complete details of this course, visit our Security Training page.

                                             www.SecurityXploded.com
Who Are We?
Nagareshwar
     Founder of SecurityXploded
     Reversing, Malware Analysis, Crypto, Secure Coding
     Twitter: @tnagareshwar


Monnappa
     Info Security Investigator @ Cisco
     Member of SecurityXploded (SX)
     Reverse Engineering, Malware Analysis, Memory Forensics
     Twitter: @monnappa22


                                      www.SecurityXploded.com
Part I
 Trailer
(by Nagareshwar)




    www.SecurityXploded.com
Contents of Part 1
   What is Virus/Malware/Worm

   Symptoms of Infection

   Agent in Action

   Deletion of Hidden/Protected Files

   Last Resort

   Anti-Malware Tips




                                         www.SecurityXploded.com
What is Virus/Malware/Worm ?

   Malware: Software written for malicious purposes
        - destroy data, steal money, annoy users

   Virus: Malware which requires human intervention to spread
         - require user to click on the exe, open a document or visit a website


   Worm: Malware which can spread automatically
       - automatically infect other systems in the network
       - spreads through plug & play devices




                                            www.SecurityXploded.com
Symptoms of Infection

   Unusual Behaviour in Applications

   System Slowdown

   (Suddenly) Laptop Getting Heated Heavily

   Password Change/Reset Emails for your Bank or Online Accounts

   Surprise Financial Transactions on your Credit Cards 




                                        www.SecurityXploded.com
Agent in Action
   Full Anti-virus Scan

      - detect known malwares

   Rootkit Scan

    - GMER, SpyDLLRemover (helps in removal of malware DLLs)

   Scan the Infected or Suspicious file with VirusTotal

     - Get the name of virus/malware family

     - Use VirusTotal Scanner Tool for quick scan

   Check with AV sites like McAfee, Symantec for the detected Malware

     - to understand infection details or for any removal steps



                                              www.SecurityXploded.com
Agent in Action (contd)
    BHO Scan (System Slowdown)
    - Run SpyBHORemover and disable unusable BHOs



    Delete Locked/Hidden/Protected Malware Files

    - Login through safe mode and see if you can still delete the files
    - Boot with BackTrack, mount your drives and delete the files



    Change Passwords of Bank & other important accounts
    - Facebook, Google, Twitter, PayPal etc.




                                                       www.SecurityXploded.com
Rootkit Scan using GMER




          www.SecurityXploded.com
Remove Malware DLLs using SpyDLLRemover




                www.SecurityXploded.com
VirusTotal Scanner Tool




         www.SecurityXploded.com
Remove BHOs using SpyBHORemover




              www.SecurityXploded.com
Threat Report on Virus




         www.SecurityXploded.com
Deletion of Hidden/Protected Files

    Make sure Malware is not Running
    - use GMER to kill any running process and SpyDllRemover to free the DLLs


    Find and Delete the Hidden Files
    - from CMD prompt run dir /a to discover hidden files
    - then execute command, attrib -s -h -r *.exe to unhide the files and then delete them


    Login using Safe Mode and then try to Delete the Files


    If all fails Boot using Live CD such as BartPE or BackTrack
     - this will defeat most of Rootkit tricks to hide & protect virus files




                                                             www.SecurityXploded.com
Last Resort

In case of full system or widespread infections,

    System Restore to ‘Right Restore Point’
    - look at the dates of infected files and it should give you right date to restore from


   Format and Re-install OS
    - clean-up other drives if necessary


   Scan other systems/devices in your Network
    - Your laptops, office systems or friends system may be infected as well




                                                        www.SecurityXploded.com
Anti-Malware Tips

   Never Trust your AntiVirus for Full Protection
    - It cannot detect advanced virus especially rootkit oriented ones,
    - Smart virus can disable AV auto protection silently giving you false sense of security


   Always Scan any EXE with VirusTotal
    - scan files downloaded from Internet and even files sent by close friends
    - Use VirusTotal Scanner for quick scan


   Disable AutoRun
    - most malwares use this mechanism spread very effectively
    - prevent getting infected through USB stick and stop it from spreading




                                                      www.SecurityXploded.com
Anti-Malware Tips (contd)

   Keep tab on your Startup programs
    - Use HijackThis or AutoRuns from SysInternals


   Monitor Worms coming through Network
    - Use NetShareMonitor


   Backup your Critical Files Periodically
    - One who Laughs last is the one who had the backup :)




                                                     www.SecurityXploded.com
Part 2
Real Show
 (by Monnappa)




   www.SecurityXploded.com
Contents of Part 2
   Detection and Removal

   Persistent Mechanism

   Demo 1

   Demo 2

   Demo 3

   Demo 4



                            www.SecurityXploded.com
Detection and Removal

1) Isolate the system from the rest of the network

2) Look for suspicious file, process, network and regsitry values

3) Identify the file generating the suspicious activity

4) Isolate the suspicious file

5) verify if the file is malicious

6) Identify the persistence mechanism

7) Break its persistence mechansim

8) Delete the malicious files from the system

9) monitor for suspicious activities (repeat step 2 to step 8)


                                                 www.SecurityXploded.com
Persistent mechanism
Below are some of the persistent mechanism used by malware:
1) Run Registry key

2) Appinit_DLL’s

3) WinLogon Notify

4) Runs as Service

5) Service DLL

6) BHO




                                 www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious process
Process explorer shows suspicious process on192.168.1.100




                                        www.SecurityXploded.com
Persistence mechanism
Registers the malicious executable in the “Run” registry key, to survive reboot




                                            www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the persistence
Deleting the registry value removes the persistence mechanism used by the malware




                                         www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious process
Process explorer shows suspicious process on192.168.1.100




                                        www.SecurityXploded.com
Persistence mechanism
Malware runs as service which is set to auto-start




                                           www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the persistence
Deleting the registry value removes the persistence mechanism used by the malware




                                         www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious process
Below screenshot shows svchost.exe (pid 1052) making connections on port 80




                                        www.SecurityXploded.com
Persistence mechanism
Malware installs a service DLL under the “netsvcs” svchost group




                                          www.SecurityXploded.com
VirusTotal Results
Suspicious file was confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the persistence
Deleting the registry key removes the persistence mechanism used by the malware




                                        www.SecurityXploded.com
Removal
Deleting the malicious file to remove the malware from the system




                                          www.SecurityXploded.com
Suspicious Network Activity
Packet capture shows suspicious activity from 192.168.1.100




                                         www.SecurityXploded.com
Suspicious process activity
Shows iexplore.exe making connections on port 80 (even though iexplore.exe was not run manually)




                                         www.SecurityXploded.com
Persistence mechanism
Malware installs Appinit DLL which loads the DLL into all the process which loads user32.dll




                                           www.SecurityXploded.com
Persistence mechanism (contd)
Malware hooks to the winlogon event




                                      www.SecurityXploded.com
VirusTotal Results
Suspicious files were confirmed to be malicious




                                          www.SecurityXploded.com
Breaking the persistence
Deleting the registry key removes the persistence mechanism used by the malware




                                        www.SecurityXploded.com
Removal
Deleting both the malicious files to remove the malware from the system




                                          www.SecurityXploded.com
Reference

http://securityxploded.com/spydllremover.php

http://securityxploded.com/virus-total-scanner.php

http://securityxploded.com/bhoremover.php

http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx

http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx

http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx


                                   www.SecurityXploded.com
Thank You !



www.SecurityXploded.com




       www.SecurityXploded.com

Mais conteúdo relacionado

Mais procurados

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
New microsoft word document
New microsoft word documentNew microsoft word document
New microsoft word documentashishdass1000
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Security threats explained
Security threats explained Security threats explained
Security threats explained Abhijeet Karve
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02Computer Science Club
 
Remove Windows Protection Unit - Guideline For Automatic Removal
Remove  Windows Protection Unit  - Guideline For Automatic RemovalRemove  Windows Protection Unit  - Guideline For Automatic Removal
Remove Windows Protection Unit - Guideline For Automatic Removalcostamary
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensicssecurityxploded
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_salityGustav Kato
 

Mais procurados (20)

Win64 malware gen
Win64 malware genWin64 malware gen
Win64 malware gen
 
Watering hole attacks case study analysis
Watering hole attacks case study analysisWatering hole attacks case study analysis
Watering hole attacks case study analysis
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Rootkit
RootkitRootkit
Rootkit
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Ch0 1
Ch0 1Ch0 1
Ch0 1
 
New microsoft word document
New microsoft word documentNew microsoft word document
New microsoft word document
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious
MaliciousMalicious
Malicious
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
20111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture0220111204 intro malware_livshits_lecture02
20111204 intro malware_livshits_lecture02
 
Remove Windows Protection Unit - Guideline For Automatic Removal
Remove  Windows Protection Unit  - Guideline For Automatic RemovalRemove  Windows Protection Unit  - Guideline For Automatic Removal
Remove Windows Protection Unit - Guideline For Automatic Removal
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
 
How to remove_sality
How to remove_salityHow to remove_sality
How to remove_sality
 

Destaque

Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityDefconRussia
 
Variable neighborhood search
Variable neighborhood searchVariable neighborhood search
Variable neighborhood searchAhmed Fouad Ali
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23DefconRussia
 
Poluição
PoluiçãoPoluição
Poluiçãopunkstar
 
Utilización de maquinas laser
Utilización de maquinas laserUtilización de maquinas laser
Utilización de maquinas laserPederasta
 
February Phoenix East Valley Real Estate Market Report
February Phoenix East Valley Real Estate Market ReportFebruary Phoenix East Valley Real Estate Market Report
February Phoenix East Valley Real Estate Market ReportLen Nevin
 
Aprender y enseñar en colaboración Guerrero Moya
Aprender y enseñar en colaboración Guerrero MoyaAprender y enseñar en colaboración Guerrero Moya
Aprender y enseñar en colaboración Guerrero Moyamoya77
 
Präsentation abwasser cem 40 a de
Präsentation abwasser cem 40 a dePräsentation abwasser cem 40 a de
Präsentation abwasser cem 40 a deJulija_RU
 
Sintese Informa: a verdade sobre o piso
Sintese Informa: a verdade sobre o pisoSintese Informa: a verdade sobre o piso
Sintese Informa: a verdade sobre o pisodiego_coliveira
 

Destaque (17)

Ludden q3 2008_boston
Ludden q3 2008_bostonLudden q3 2008_boston
Ludden q3 2008_boston
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
Variable neighborhood search
Variable neighborhood searchVariable neighborhood search
Variable neighborhood search
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
 
Poluição
PoluiçãoPoluição
Poluição
 
Utilización de maquinas laser
Utilización de maquinas laserUtilización de maquinas laser
Utilización de maquinas laser
 
Engaging the community in road safety anna mc dowall
Engaging the community in road safety   anna mc dowallEngaging the community in road safety   anna mc dowall
Engaging the community in road safety anna mc dowall
 
February Phoenix East Valley Real Estate Market Report
February Phoenix East Valley Real Estate Market ReportFebruary Phoenix East Valley Real Estate Market Report
February Phoenix East Valley Real Estate Market Report
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
Case Novo Núcleo
Case Novo NúcleoCase Novo Núcleo
Case Novo Núcleo
 
Semarang workshop 2012
Semarang workshop 2012Semarang workshop 2012
Semarang workshop 2012
 
Tanveer Mubarik.
Tanveer Mubarik.Tanveer Mubarik.
Tanveer Mubarik.
 
Aprender y enseñar en colaboración Guerrero Moya
Aprender y enseñar en colaboración Guerrero MoyaAprender y enseñar en colaboración Guerrero Moya
Aprender y enseñar en colaboración Guerrero Moya
 
Sawabona Shikoba
Sawabona ShikobaSawabona Shikoba
Sawabona Shikoba
 
Art
ArtArt
Art
 
Präsentation abwasser cem 40 a de
Präsentation abwasser cem 40 a dePräsentation abwasser cem 40 a de
Präsentation abwasser cem 40 a de
 
Sintese Informa: a verdade sobre o piso
Sintese Informa: a verdade sobre o pisoSintese Informa: a verdade sobre o piso
Sintese Informa: a verdade sobre o piso
 

Semelhante a Advanced Malware Analysis Training - Detection and Removal of Malwares

Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of MalwaresAdvanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwaressecurityxploded
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysisAbdulrahman Bassam
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysissecurityxploded
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensicssecurityxploded
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsCysinfo Cyber Security Community
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.comgerryfebre
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.comkingh05
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware LabDigit Oktavianto
 
so big
so bigso big
so bigcainem
 
so big ppt
so big pptso big ppt
so big pptcainem
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profitMohammed Adam
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 

Semelhante a Advanced Malware Analysis Training - Detection and Removal of Malwares (20)

Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of MalwaresAdvanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensics
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malware
MalwareMalware
Malware
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
How To Uninstall Masksearch.com
How To Uninstall Masksearch.comHow To Uninstall Masksearch.com
How To Uninstall Masksearch.com
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Remove Clickhoofind.com
 Remove Clickhoofind.com Remove Clickhoofind.com
Remove Clickhoofind.com
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware Lab
 
so big
so bigso big
so big
 
so big ppt
so big pptso big ppt
so big ppt
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 

Mais de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mais de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Último

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Último (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Advanced Malware Analysis Training - Detection and Removal of Malwares

  • 1. Advanced Malware Analysis Training Series www.SecurityXploded.com
  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the Trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to Null community for their extended support and co-operation.  Special thanks to ThoughtWorks for the beautiful venue.  Thanks to all the trainers who have devoted their precious time and countless hours to make it happen. www.SecurityXploded.com
  • 4. Advanced Malware Analysis Training This presentation is part of our Advanced Malware Analysis Training program. Currently it is delivered only during our local meets for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who Are We? Nagareshwar  Founder of SecurityXploded  Reversing, Malware Analysis, Crypto, Secure Coding  Twitter: @tnagareshwar Monnappa  Info Security Investigator @ Cisco  Member of SecurityXploded (SX)  Reverse Engineering, Malware Analysis, Memory Forensics  Twitter: @monnappa22 www.SecurityXploded.com
  • 6. Part I Trailer (by Nagareshwar) www.SecurityXploded.com
  • 7. Contents of Part 1  What is Virus/Malware/Worm  Symptoms of Infection  Agent in Action  Deletion of Hidden/Protected Files  Last Resort  Anti-Malware Tips www.SecurityXploded.com
  • 8. What is Virus/Malware/Worm ?  Malware: Software written for malicious purposes - destroy data, steal money, annoy users  Virus: Malware which requires human intervention to spread - require user to click on the exe, open a document or visit a website  Worm: Malware which can spread automatically - automatically infect other systems in the network - spreads through plug & play devices www.SecurityXploded.com
  • 9. Symptoms of Infection  Unusual Behaviour in Applications  System Slowdown  (Suddenly) Laptop Getting Heated Heavily  Password Change/Reset Emails for your Bank or Online Accounts  Surprise Financial Transactions on your Credit Cards  www.SecurityXploded.com
  • 10. Agent in Action  Full Anti-virus Scan - detect known malwares  Rootkit Scan - GMER, SpyDLLRemover (helps in removal of malware DLLs)  Scan the Infected or Suspicious file with VirusTotal - Get the name of virus/malware family - Use VirusTotal Scanner Tool for quick scan  Check with AV sites like McAfee, Symantec for the detected Malware - to understand infection details or for any removal steps www.SecurityXploded.com
  • 11. Agent in Action (contd)  BHO Scan (System Slowdown) - Run SpyBHORemover and disable unusable BHOs  Delete Locked/Hidden/Protected Malware Files - Login through safe mode and see if you can still delete the files - Boot with BackTrack, mount your drives and delete the files  Change Passwords of Bank & other important accounts - Facebook, Google, Twitter, PayPal etc. www.SecurityXploded.com
  • 12. Rootkit Scan using GMER www.SecurityXploded.com
  • 13. Remove Malware DLLs using SpyDLLRemover www.SecurityXploded.com
  • 14. VirusTotal Scanner Tool www.SecurityXploded.com
  • 15. Remove BHOs using SpyBHORemover www.SecurityXploded.com
  • 16. Threat Report on Virus www.SecurityXploded.com
  • 17. Deletion of Hidden/Protected Files  Make sure Malware is not Running - use GMER to kill any running process and SpyDllRemover to free the DLLs  Find and Delete the Hidden Files - from CMD prompt run dir /a to discover hidden files - then execute command, attrib -s -h -r *.exe to unhide the files and then delete them  Login using Safe Mode and then try to Delete the Files  If all fails Boot using Live CD such as BartPE or BackTrack - this will defeat most of Rootkit tricks to hide & protect virus files www.SecurityXploded.com
  • 18. Last Resort In case of full system or widespread infections,  System Restore to ‘Right Restore Point’ - look at the dates of infected files and it should give you right date to restore from  Format and Re-install OS - clean-up other drives if necessary  Scan other systems/devices in your Network - Your laptops, office systems or friends system may be infected as well www.SecurityXploded.com
  • 19. Anti-Malware Tips  Never Trust your AntiVirus for Full Protection - It cannot detect advanced virus especially rootkit oriented ones, - Smart virus can disable AV auto protection silently giving you false sense of security  Always Scan any EXE with VirusTotal - scan files downloaded from Internet and even files sent by close friends - Use VirusTotal Scanner for quick scan  Disable AutoRun - most malwares use this mechanism spread very effectively - prevent getting infected through USB stick and stop it from spreading www.SecurityXploded.com
  • 20. Anti-Malware Tips (contd)  Keep tab on your Startup programs - Use HijackThis or AutoRuns from SysInternals  Monitor Worms coming through Network - Use NetShareMonitor  Backup your Critical Files Periodically - One who Laughs last is the one who had the backup :) www.SecurityXploded.com
  • 21. Part 2 Real Show (by Monnappa) www.SecurityXploded.com
  • 22. Contents of Part 2  Detection and Removal  Persistent Mechanism  Demo 1  Demo 2  Demo 3  Demo 4 www.SecurityXploded.com
  • 23. Detection and Removal 1) Isolate the system from the rest of the network 2) Look for suspicious file, process, network and regsitry values 3) Identify the file generating the suspicious activity 4) Isolate the suspicious file 5) verify if the file is malicious 6) Identify the persistence mechanism 7) Break its persistence mechansim 8) Delete the malicious files from the system 9) monitor for suspicious activities (repeat step 2 to step 8) www.SecurityXploded.com
  • 24. Persistent mechanism Below are some of the persistent mechanism used by malware: 1) Run Registry key 2) Appinit_DLL’s 3) WinLogon Notify 4) Runs as Service 5) Service DLL 6) BHO www.SecurityXploded.com
  • 25.
  • 26. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 27. Suspicious process Process explorer shows suspicious process on192.168.1.100 www.SecurityXploded.com
  • 28. Persistence mechanism Registers the malicious executable in the “Run” registry key, to survive reboot www.SecurityXploded.com
  • 29. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 30. Breaking the persistence Deleting the registry value removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 31. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 32.
  • 33. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 34. Suspicious process Process explorer shows suspicious process on192.168.1.100 www.SecurityXploded.com
  • 35. Persistence mechanism Malware runs as service which is set to auto-start www.SecurityXploded.com
  • 36. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 37. Breaking the persistence Deleting the registry value removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 38. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 39.
  • 40. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 41. Suspicious process Below screenshot shows svchost.exe (pid 1052) making connections on port 80 www.SecurityXploded.com
  • 42. Persistence mechanism Malware installs a service DLL under the “netsvcs” svchost group www.SecurityXploded.com
  • 43. VirusTotal Results Suspicious file was confirmed to be malicious www.SecurityXploded.com
  • 44. Breaking the persistence Deleting the registry key removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 45. Removal Deleting the malicious file to remove the malware from the system www.SecurityXploded.com
  • 46.
  • 47. Suspicious Network Activity Packet capture shows suspicious activity from 192.168.1.100 www.SecurityXploded.com
  • 48. Suspicious process activity Shows iexplore.exe making connections on port 80 (even though iexplore.exe was not run manually) www.SecurityXploded.com
  • 49. Persistence mechanism Malware installs Appinit DLL which loads the DLL into all the process which loads user32.dll www.SecurityXploded.com
  • 50. Persistence mechanism (contd) Malware hooks to the winlogon event www.SecurityXploded.com
  • 51. VirusTotal Results Suspicious files were confirmed to be malicious www.SecurityXploded.com
  • 52. Breaking the persistence Deleting the registry key removes the persistence mechanism used by the malware www.SecurityXploded.com
  • 53. Removal Deleting both the malicious files to remove the malware from the system www.SecurityXploded.com
  • 55. Thank You ! www.SecurityXploded.com www.SecurityXploded.com