Dynamic analysis is any examination after executing the malware. Usually, you can gain more insight into the functionality of the malware using dynamic analysis than just basic static techniques. Since the malware is being executed, utmost precaution must be taken as this can put the host system or network at risk.
Few dynamic analysis techniques are described below:
Sandboxes:
Sandboxes are automated software packages that execute the malware and collect various artifacts such as process execution artifacts, file, registry artifacts, network traffic etc., for us to analyze.
But, as suggested in Part 1 of this tutorial, it is never a good idea to upload samples to online sandboxes in targeted attacks, as this might alert the attacker about the analysis efforts.
Few notable online sandboxes are Hybrid analysis, https://www.hybrid-analysis.com/, Any.Run https://any.run/, malwr.com.
One good offline sandbox is Cuckoo sandbox https://cuckoosandbox.org/
Running malware and monitoring it manually:
You can run the malware on the analysis VM and use various tools to monitor it. I'll describe a few commonly used tools below.
Tools from Sysinternals Suite are very helpful in performing analysis. You can find it here:
https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
Process Monitor (Procmon) is one such tool which can be used to monitor registry, file system, network, process and thread activity. It has very good filtering capabilities, enabling us to effectively analyze the events it generates.
Process Explorer (Procexp) is another tool from Sysinternals Suite which can be used to monitor the process running on a system in a tree style with parent-child relationship, the DLLs loaded, handles used,
Network traffic of all sorts can be analyzed by running Wireshark and capturing network traffic.
Fiddler can be used to capture HTTP traffic if the malware uses WinInet API for network calls.
FakeNetNG which is available in FlareVM is a great way to capture network. This tool spoofs whatever network services the malware is looking for and logs the requests sent to it.
We'll have a look at how to use some of the tools mentioned above in the next labs walkthrough post.
Few dynamic analysis techniques are described below:
Sandboxes:
Sandboxes are automated software packages that execute the malware and collect various artifacts such as process execution artifacts, file, registry artifacts, network traffic etc., for us to analyze.
But, as suggested in Part 1 of this tutorial, it is never a good idea to upload samples to online sandboxes in targeted attacks, as this might alert the attacker about the analysis efforts.
Few notable online sandboxes are Hybrid analysis, https://www.hybrid-analysis.com/, Any.Run https://any.run/, malwr.com.
One good offline sandbox is Cuckoo sandbox https://cuckoosandbox.org/
Running malware and monitoring it manually:
You can run the malware on the analysis VM and use various tools to monitor it. I'll describe a few commonly used tools below.
Tools from Sysinternals Suite are very helpful in performing analysis. You can find it here:
https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
Process Monitor (Procmon) is one such tool which can be used to monitor registry, file system, network, process and thread activity. It has very good filtering capabilities, enabling us to effectively analyze the events it generates.
Process Explorer (Procexp) is another tool from Sysinternals Suite which can be used to monitor the process running on a system in a tree style with parent-child relationship, the DLLs loaded, handles used,
Network traffic of all sorts can be analyzed by running Wireshark and capturing network traffic.
Fiddler can be used to capture HTTP traffic if the malware uses WinInet API for network calls.
FakeNetNG which is available in FlareVM is a great way to capture network. This tool spoofs whatever network services the malware is looking for and logs the requests sent to it.
We'll have a look at how to use some of the tools mentioned above in the next labs walkthrough post.