Lab 16-1 Solutions

Short Answers

  1. The malware checks the status of the BeingDebugged, ProcessHeap, and NTGlobalFlag flags to determine if it is being run in a debugger.

  2. If any of the malware’s anti-debugging techniques succeed, it will terminate and remove itself from disk.

  3. You can manually change the jump flags in OllyDbg during runtime, but doing so will get tedious since this malware checks the memory structures so frequently. Instead, modify the structures the malware checks in memory either manually or by using an OllyDbg plug-in like PhantOm or the Immunity Debugger (ImmDbg) PyCommand hidedebug.

  4. See the detailed analysis for a step-by-step way to dump and modify the structures in OllyDbg.

  5. Both the OllyDbg plug-in PhantOm and the ImmDbg PyCommand ...

Get Practical Malware Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.