February 2012
Intermediate to advanced
800 pages
23h 55m
English
The shellcode is stored with an alphabetic encoding; each payload byte is stored in the low nibble of two encoded bytes.
The shellcode resolves the following functions:
LoadLibraryA
GetSystemDirectoryA
TerminateProcess
GetCurrentProcess
WinExec
URLDownloadToFileA
The shellcode downloads this URL:
http://www.practicalmalwareanalysis.com/shellcode/annoy_user.exe
The shellcode writes %SystemRoot%\System32\1.exe and executes it.
The shellcode downloads a file from a URL stored within the encoded payload, writes it to disk, and executes it.
You can perform dynamic analysis with the shellcode_launcher.exe utility with the following command line:
shellcode_launcher.exe –i Lab19-01.bin -bp
The –bp option causes the program ...