Name of Traning:
Practical Malware Analysis Bootcamp
A full description of the training:
In this program, participants will get to know the internals of malwares, understanding its behavior, origins, and modes of infiltration. The session explores topics from fundamental structure of PE files to advanced techniques seen in a day to day analysis of malwares. You'll gain hands-on experience in dissecting malicious code and get familiar with various tools used by Malware analysts and reverse engineers. The session will cover the fundamental principles of malware analysis, guiding you through the identification and classification of various types of malware
The training is designed to bridge the gap between entry-level and intermediate malware analysts. Participants will be working hands-on with recent malware samples to get a good grasp over sophisticated evasion techniques
Outline of the Class
Malware Introduction
- What is a malware
- Identifying malicious or benign files
- Setting up a Lab for safe Malware Reversing
Pe File Format
- Parsing PE files from headers to overlay
- Analyzing Import and Export Address Table (IAT and EAT)
Brief Introduction to Windows internals and API
- Windows Architecture
- Windows Kernel Objects and Handles
- Windows Data Structures Primer
Assembly Language Basics Refresher
- X86 Architecture Review with Stack Usage and general OPcodes
Static Malware Analysis
- Playing with Disassembly
- Recognition of Packed vs Unpacked Malwares
Malware Evasion techniques
- Process Injection
- Process Replacement
- APC Injection
- DLL Persistence
- User mode Rootkits
- Persistence using Windows Registry
- Lab
Anti-VM Techniques
- Detection using VM Configuration and Hardware
- MAC Address Checks and vulnerable instructions
- Lab
Anti-Disassembly Techniques
- Return Pointer Abuse
- Disassembler Assumptions
- Breaking stack frame Analysis
- Lab
Anti-Debugging Techniques
- Anti Debugging through Windows API calls
- Structure Matching
- TLS Callbacks
- Memory Scanning
- Lab
.Net Compiled Malware
- Overview of .NET Compiled Malware
- Utilizing DNSpy and reading Decompiled code
- Common Protections
Dynamic Malware Analysis
- Malware Sandboxes and their pros and cons
- Mapped and unmapped PE file
- Common Unpacking techniques
- Debugging through a malware sample
- Extracting payload from a packed malware Lab
Writing Signatures for detection as well as Hunting purposes
- Pattern matching and using Yara for Threat Hunting
PREREQUISITES:
- Comfortable with reading C Code
- Basic understanding of the Windows environment
WHAT STUDENTS WILL BE PROVIDED WITH:
- Course material (pdf copy)
- Lab solution material
- Malware samples used in the sessions
- VM links to download
WHAT NOT TO EXPECT
- Reversing VMProtect/Themida or other commercial packer based malware/software
- Malware Removal training