[Solved] CPE457 Lab17-Malware Persistence

$25

File Name: CPE457_Lab17-Malware_Persistence.zip
File Size: 301.44 KB

SKU: [Solved] CPE457 Lab17-Malware Persistence Category: Tag:
5/5 - (1 vote)

Lab Description: The following lab allows students to explore persistence mechanisms using the Windows API. The following are suggested resources:

  • MSDN documentation
  • Static disassembly tool such as IDA Pro
  • Dynamic disassembly tool such as WinDbg

Lab Files that are Needed: persistence.exe

Lab Tasks:

  1. How does the program use the Windows registry to gain persistence?The program adds HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRunWebExBrowserExperience to the registry. This makes the program to run at startup.
  1. How does the program remove itself from the original location?

The program opens itself with CreateFileA. It creates a file called WebExBrowserAgent.exe and writes itself to that file.

  1. Discuss the significance of the location the program used for relocation. Also include your analysis on the naming conventions it used and how this may impact analysis.

The temp folder is often used because it is located on RAMDISK. This means faster writes. Temp folders also have read write access for the current user. The OS also cleans up the temp folder, so any incomplete writes, wont result in the malware getting corrupted.

Also, the program names itself after normal services like webEx to make itself look normal.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[Solved] CPE457 Lab17-Malware Persistence
$25