Dissecting Visual Basic samples
Now that we have gained some knowledge of the essentials of Visual Basic, it’s time to shift our focus and learn how to dissect Visual Basic samples. In this section, we are going to perform a detailed static and dynamic analysis.
Static analysis
The common part of VB malware is that the code generally gets executed as part of the SubMain
routine and event handlers, where timer and form load events are particularly typical.
As we have already mentioned, the choice of tools will be defined by the compilation mode that’s used when creating a malware sample.
P-code
For p-code samples, VB Decompiler can be used to get access to its internals. The Lite version is free and provides access to the p-code disassembly, which may be enough for most cases. If the engineer doesn’t have enough expertise or time to deal with the p-code syntax, then the paid full version provides a powerful decompiler that produces more readable Visual...