Lab 9.1 IDA Pro
Lab 9.1 IDA Pro
, 4 images)
What you need:
A Windows machine, real or virtual, such as the Windows 2008 Server VM we've been using
The textbook: "Practical Malware Analysis"
Purpose
You will practice using IDA Pro.
You should already have the lab files, but if you don't, do this:
http://practicalmalwareanalysis.com/labs/
https://www.hex-rays.com/products/ida/support/download_freeware.shtml
https://samsclass.info/126/proj/idafree50.exe
Click the "Function name" header to sort by name and scroll to the top.
Save this image with the filename "Proj 6a from YOUR NAME".
Scroll up to show the comments IDA added to the start of the function, listing its local variables, as shown below:
Save a full-desktop image with the filename "Proj 6c from YOUR NAME".
In the line containing "\\cmd.exe /c", double-click the address to the right of "XREF", as indicated by the red outline in the image below.
Press the SPACEBAR to get to graph view, as shown below. "\\cmd.exe /c" is used in the little routine on the left.
Drag the graph view down to see the subroutines before it. About three boxes up you should find text beginning with "Hi, Master", as shown below.
Double-click aHiMasterDDDD to find the complete message. The purpose of the malware is clearly stated.
Your image should show what the code is doing, as shown below. The purpose is behind the red rectangle in the image below.
Save a full-desktop image with the filename "Proj 6d from YOUR NAME".