427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet294/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   290   291   292   293   294   295   296   297   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Using Sandbox Tools for Botnets • Chapter 10
361
427_Botnet_10.qxd 1/9/07 3:06 PM Page 361


possible 
TNotification
objects, a separate section is included, if such notifica-
tions have been monitored during the execution. In the following, some
interesting extracts from these sections are shown and explained. Notice that
sometimes we have skipped several notifications or left out some of their
attributes for better readability.









The upper section gives us information about the loaded modules of the
malware process. It starts with the particular malware image file, followed by
the Windows standard libraries ntdll.dll and kernel32.dll, which are loaded
into each Windows user process. From the information that msvcrt.dll is
loaded, we can know (or at least assume) that the malware is written in C,
since it is the standard runtime library for Microsoft C applications. As the
libraries ws2_32.dll and wininet.dll are loaded, we know that the malware is
going to use the Winsock library to set up outgoing or incoming TCP/IP
connections. Because the examined malware file is a bot application, this is
not amazing. From the fact that pstorec.dll is loaded, we can assume that the
malware is going to access the Protected Storage, most probably for stealing
some authentication data stored within it. In the next analysis section you can
see what we already assumed before:The malware copies itself to the
Windows system directory using the destination filename arman.exe:

dstfile="C:\WINDOWS\system32\arman.exe"
creationdistribution="CREATE_ALWAYS"/>

The following outputs show us that a new process is started from this cre-
ated arman.exe file. We see that the new process should be created without
showing the main window:
showwindow=”SW_HIDE”.
Furthermore, we are
informed that the API function 
CreateProcessA
was used for that purpose.The

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   290   291   292   293   294   295   296   297   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish