1. Basic Static Techniques

What you need:

Malware Samples

This project follows Lab01-01 in the book, using Lab01-01.exe and Lab01-01.dll.


This Google product compares a file to a database of antivirus engines. You can upload files, but that may alert attackers that you have detected an intrusion. Using it to search for a hash value of a sample is safer.

As shown below, some of the engines detect Lab01-01.dll.


PEview shows the sections that make up a PE (Portable Executable) file. The "Time Date Stamp" shows when the files were compiled. This is often used as an indication of the time zone the attackers live in.

The files were both compiled on the same date within a minute of each other, indicating that they are part of the same package.


PEiD shows what language the sample was written in, or what packer was used if it's packed.

These files are identified as "Microsoft Visual C++" files, which shows that they are unpacked.


BinText is a handy tool to view strings.

Look at the strings for Lab01-01.dll.

Notice these items, as shown below:

The command to launch a program is missing. To see it, click the Filter tab and adjust the "Min. text length" to 4 as shown below.

Click the Search tab. At the top right, click Go.

Now you can see that the command to launch a program is exec, as shown below.

Then collect the strings from the Lab01-01.exe file.

Notice these items, as shown below:

Dependency Walker

Open Lab01-01.exe in Dependency Walker.

The top left pane is the In the top left pane is called "Module Dependency Tree View". It shows the EXE file and the two Windows libraries it uses: MSVCRT.DLL and KERNEL32.DLL.

In the top left pane, click MSVCRT.DLL. The top right pane shows "Parent Imports". These are the functions the EXE file uses from the library file.

As shown below, this executable uses only a small number of library functions, and none of them indicate much about its purpose. One of them is named _stricmp, which indicates that this progam performs a string copmarison, but that's a very common operation.

In the top left pane, click KERNEL32.DLL.

The top right pane shows that this file uses several functions that manipulate files, including FindNextFileA and FindFirstFileA, as shown below.

This suggests that the malware searches through the file system and can open and modify files.

Open Lab01-01.dll in Dependency Walker. In the top left pane, partially collapse the tree to match the image below and click WS2_32.DLL.

The top right pane doesn't show function names this time, it only shows "Ordinal" numbers. This is called Linking by Ordinal, and it's an annoyance to us because we can't easily see what functions are in use.

However, the center-right pane shows the Exports of WS2_32.DLL, which include accept, bind, and connect. These are the standard Berkeley Sockets functions used for networking. This suggest that the malware performs some networking functions, such as connecting to a server and opening a listening port.

In the top let pane, click KERNEL32.DLL. The top right pane shows the "Parent Imports", which include CreateProcessA and Sleep, as shown below.

For more information about using Dependency Walker, see ths tutorial:

Analyzing dependencies with Dependency Walker

Find the Downloaded File (5 pts)

Analyze the sample Lab01-04.exe

It downloads a file from this domain: practicalmalwareanalysis.com

Find that file's name and use the form below to get your points.

Your Name:
Filename like this:

Find the Function Name (5 pts)

Analyze the sample Lab01-04.exe

It imports a function from WINTRUST.DLL

Find that function's name and use the form below to get your points.

Your Name:
Function name like this:

Last modified 1-7-19