Dissecting interesting malware sample parts
As mentioned before, this malware consists of two components: a Portable Executable file (park.exe
) and a Windows driver file (rk.sys
).
When more than one malicious file is found on a computer, it is quite common that one of them generates the other(s). As park.exe
can be executed by double-clicking on it, while rk.sys
must be loaded by another component such as the Windows Service Control Manager or another driver, we can initially assume that park.exe
was executed and then it dropped rk.sys
to the disk. In fact, during our static analysis of the imports, we notice that park.exe
has APIs to deal with the Windows Service Control Manager. As shown in the following screenshot, this file starts with the following pattern: 4d 5a 90 00
. The starting bytes are also used as the signature of files; these signatures are also known as magic numbers or magic bytes. In this case, the signature indicates that this file is a Portable Executable (the...