Lab 19-2 Solutions
Short Answers
The program process-injects the default web browser, Internet Explorer.
The shellcode buffer is located at 0x407030.
The shellcode is XOR’ed with the byte 0xe7.
The shellcode manually imports the following functions:
LoadLibraryA
CreateProcessA
TerminateProcess
GetCurrentProcess
WSAStartup
WSASocketA
connect
The shellcode connects to IP 192.168.200.2 on TCP port 13330.
The shellcode provides a remote shell (cmd.exe).
Detailed Analysis
The malware starts by determining the default web browser by reading the registry value
HKCR\http\shell\open\command
. The browser is created as a new
process whose StartupInfo.wShowWindow
value is set to SW_HIDE
, so the process is hidden from the user interface. Process-injecting the default web ...
Get Practical Malware Analysis now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.