{"id":33,"date":"2022-05-13T04:48:44","date_gmt":"2022-05-13T04:48:44","guid":{"rendered":"https:\/\/blogs.oregonstate.edu\/glennf\/?p=33"},"modified":"2022-05-13T04:48:44","modified_gmt":"2022-05-13T04:48:44","slug":"a-hint-of-dynamic-analysis","status":"publish","type":"post","link":"https:\/\/blogs.oregonstate.edu\/glennf\/2022\/05\/13\/a-hint-of-dynamic-analysis\/","title":{"rendered":"A Hint of Dynamic Analysis"},"content":{"rendered":"\n<p>This week I have started dynamic analysis. This consists of using Process Monitor, Process Explorer, WireShark, and INetSim.<\/p>\n\n\n\n<p>As outlined in my previous blog posts I have set up an isolated virtual environment and I have taken safety precautions before launching the malware. What is key to this analysis is setting up snapshots prior to unleashing the malware so I may revert my virtual machine after unleashing the malware and using each tool.<\/p>\n\n\n\n<p>Process Monitor allows me to see all of the processes, files system changes, and registry changes running on the machine. This software provides a heavily detailed report as it captures information about ALL processes running on the machine. To gain relevant information filters are used to narrow down data.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/tLiMZLzJ3iqkYskOd1jFn8XVx2x8mBrmxctrPJDi0fnq1rL44OMygWAb8e-_gK1hRfYtk5lwSwiJ9Qu4urmq3_B0K3OTMpXgJT8Qjw7INwgFKrwz23KfXGlknrGdepW0QWuxJ2sH7JwJtcDkmw\" alt=\"\" \/><\/figure>\n\n\n\n<p>After starting the process monitor and launching the malware I see that a process is created for wupdmgr.exe.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/9mx_TlWQp_h-Aw5uAeJWaNvnOoNZjHa_ISx3G_BYS75i_9JhQHl7QpZNVuH6foGqo4sXRHZ7mEPYP3VGELy-sAESY9XU0_VlZrNpA37_Hhu1xGc1wlYE-QTO5Dnv1VdzA-rPYrnpwdZQKLXnoQ\" alt=\"\" \/><\/figure>\n\n\n\n<p>After seeing this I was curious as to whether wupdmgr creates any files so I set filters for the process name wupdmgr.exe and the function CreateFile. Below we can see that it created winup.exe and wupdmgrd.exe.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/KxW1L58dxZt9bZR75IDNpFem28bR3bNWKZ56AqwmIJGBbPDyyDUaSqb2XVgQ_fdoVPaMCUsoU8gIkLn6VBbx9SdWRZ5Bs67oGLoF3NrpCt_oHcLuBeZwMcy7RR3fQa1nfmVzgHsAOvnaLQrKmA\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/BbuBPY8J8lRNDQBeQCpDVhdFyspC0ZRlI_6NX6IS4fdSLAsLQfQlqAmlpPjaU-92GZ4VrxzDScPoMK7T8lDMSiVM-gksyJVPpjs4lc7ANBQx8Vikcw1NpwpvLBUkCmr_eDLQXdGGNqN7lOuESw\" alt=\"\" \/><\/figure>\n\n\n\n<p>Process Explorer is useful as it demonstrates which handles or DLLs processes have opened.<\/p>\n\n\n\n<p>To supplement the information provided by Process Monitor, we learn that wupdmgr.exe is a subprocess launched&nbsp; from Lab01-04.exe<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/AjzCT4zwvpGfkDW8W3rbubXHaLdlUkI9c_AoWBOlQ7P-vGsBoU7FvFBc7zv8OmUezWhu_iDxlmagcrnSiRc4tgpQjR1lZr4n8fr5KB0iwCsrdPKFsMhMka-SSXCGVLi_4J776_0KClfsw5O2IA\" alt=\"\" \/><\/figure>\n\n\n\n<p>The executable wupdmgr.exe then launches winup.exe as a subprocess. Internet Explorer is also launched.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/cjJAIUBsPyMNrj5bU003SmP-DqcsUHeADKxCJsqabhWm2QC9XasRGDio_8eGKy2qHKQXTOmxiZAfmBWBJNBLpp2wO4JBko1WglrsLHcJCHeP2DdxK3AUuk20OYjHSeGNmNlGPrlRqwzF0VFV4g\" alt=\"\" \/><\/figure>\n\n\n\n<p>Both wupdmgr.exe and winup.exe terminate leaving wupdmgrd.exe running. When wupdmgrd.exe runs it makes the default GUI binary from INetSim run. This appears to be run when wupdmgrd.exe is launched.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/zTImp9bOoIlOWqVWzShGazFOtoU75--cz1SP-GHgircsZgyrLMeD41eAvo73ag74-dtMtlEzT2egAC3d9o-qjuDkkxYCV9GI5F_ZqwSieXoagv1m_cW80TXoahxkXLzg1W-CWiVVBx2UWnxAsw\" alt=\"\" \/><\/figure>\n\n\n\n<p>By using these three programs I already have a good idea of how the malware works in real time. As I continue my research I will analyze the effects on the registry using RegShot. RegShot allows me to see if any values are added or deleted from the registry.<\/p>\n\n\n\n<p><strong>Sources Cited<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/procmon\">https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/procmon<\/a><\/li><li><a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/process-explorer\">https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/process-explorer<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This week I have started dynamic analysis. This consists of using Process Monitor, Process Explorer, WireShark, and INetSim. As outlined in my previous blog posts I have set up an isolated virtual environment and I have taken safety precautions before launching the malware. What is key to this analysis is setting up snapshots prior to [&hellip;]<\/p>\n","protected":false},"author":12309,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-33","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/posts\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/users\/12309"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":1,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/posts\/33\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/glennf\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}