Chapter 3 – Dynamic Analysis – Techniques and Tooling
The challenges in Chapter 3 focus on automation and dynamic analysis of samples. The answers are as follows:
- This malware sample does not appear to create a persistence mechanism immediately following execution.
- The file will write one decoded payload to
C:\Users\Public\*.GOF
with the SHA256 of47b1f63e7db1c24ad6f692cf1eb0e92dd6de27a16051f390 f5b441afc5049fea
. - Checking for alternate data streams via PowerShell reveals no hidden data within our payload.
- If there were persistence mechanisms or files uncovered by our script(s), we could easily add a pipeline element to
Remove-Item
or similar in order to automate the removal of files and registry keys. The same could be used with scheduled tasks viaUnregister-ScheduledTask
.