Lab Setup And Cursory Analysis - ConnorEast/Tech-Journal GitHub Wiki

DISCLAIMER:

None of the files related to this lab are allowed to be uploaded and as such here is a synapsis of the steps which occured during the setup proccess for this assignment. Anything may be changed at any time depending on the whims of your specific professor.

Assignment one: Malware Analysis Lab Setup

Zip Files sha256 Official Website
Browmal d96f2b96e5d35991cda38971c2c13b4d89eb6a575c50db1e223bb46f10f5ec88 https://github.com/thedunston/browmal/
floss 6c71089b8c629c69424b042769f1565f71adc6cd24b2f8d3713c96fa7fdac2fb https://github.com/mandiant/flare-floss
pestudio c1e2d0c1fbf5951486cf3d850cc24b11b66e25e0a5b77a623e2eb13ffad9ddd9 https://www.winitor.com/
Sigcheck 96efa256749fde2ef157baee9677e417047a0d77325ad97ca800fa10c4bf0dbf https://learn.microsoft.com/en-us/sysinternals/downloads/sigcheck
Strings b1a0a3dc5f639af1c98ae5832676727646eb3d543640e65e310dff747e733a25 https://learn.microsoft.com/en-us/sysinternals/downloads/strings
upx-5.0.2-win64 4f1f3df0b2af164507541544325b89395723bbdc https://upx.github.io/
yara-master-v4.5.4-win64> 60a536027e94b0b4093f2911a7a22324c4db0cff https://virustotal.github.io/yara/

Locate the sha256 hash files for the following files/.exe

EXE Files sha256 Official Website
pestudio.exe 137296fc58b67b28e67830576ff1dde4fdcd68228066af39a642b0cf7b1387a0 https://www.winitor.com/
capa.exe 174ab9479619016b10cf2e86ad2d8ab8d34ffb65b0b91ba65e27d037a86c24a4 https://github.com/mandiant/capa
floss.exe 3a208ab834b4791e81592d66e91a7f07b3458504484d87c44ed32bc7384df7ef https://github.com/mandiant/flare-floss
Strings.exe a7553d77edca85bec980e38e69bf0e9f36962f20be0ee759e9a96030d519c5a0 https://learn.microsoft.com/en-us/sysinternals/downloads/strings
Strings64.exe 05dbb43499bcff44424c7ac2d987ea9e9742cd90afe360e84ba0bccade17f71b https://learn.microsoft.com/en-us/sysinternals/downloads/strings
Strings64a.exe https://learn.microsoft.com/en-us/sysinternals/downloads/strings https://learn.microsoft.com/en-us/sysinternals/downloads/strings
ExplorerSuite.exe 94f4348ec573b05990b1e19542986e46dc30a87870739f5d5430b60072d5144d https://ntcore.com/explorer-suite/
upx.exe 3638bfe45ee552b57dc8c5af39c5e0f317ff83748dbf6326a0cdcccb2fd52da4 https://upx.github.io/
yarac64.exe 6f69a14820e750b22662dc9339bfd22b9cfe51877c4103b6863f48efe6db956e https://virustotal.github.io/yara/
yara64.exe 70ad6fa681d6878e717e31cb58668c7b8936f74775ec328dee86b07f83a54545 https://virustotal.github.io/yara/
Sigcheck.exe 4fe9a2bd4b160a5352333d00d0b0c10f13685af7acdb48e9e9d0c3877a19eed4 https://learn.microsoft.com/en-us/sysinternals/downloads/sigcheck
Sigcheck64.exe 5d9e06ba65bb4d365e98fbb468f44fa8926f05984bf1a77ec7b1df19c43dc5ef https://learn.microsoft.com/en-us/sysinternals/downloads/sigcheck
sigcheck64a.exe 664b41f1ee3e76b68e0887b338dd8f56e222780b12aaf97bbffddbaadce119ae https://learn.microsoft.com/en-us/sysinternals/downloads/sigcheck
[browmal] Index.html 36616d526623c16b6129a21bb3eb05db8c171abc567da9c992da11952c2946a3 https://github.com/thedunston/browmal/
[browmal] wasm_exec.js 45ce9dfe7211247544ab6f4268eb8cb5b6f3d5ae602dc3b51447b7eada99c229 https://github.com/thedunston/browmal/


Assignment one: Section Two AI

Following this we then did some minor research on YARA files before downloading Llamafile and running it natively through command prompt. to run it use ".\google_gemma-3-12b-it-Q4_K_M.exe -ngl 0" or ".\google_gemma-3-12b-it-Q4_K_M.exe". Using the AI I asked it a question to create a YARA search. Below is what I got as a response Untitled image image

Llama generated script

rule PE_Executable
{
    meta:
        description = "Detects Portable Executable files (PE)"
        author = "AI Assistant"
        date = "2024-10-27"
strings:
    $pe_header = "MZ" ascii wide  // Magic number for PE files
    $pe_header2 = "PE" ascii wide
    $import_directory = "kernel32" ascii wide
    $import_directory2 = "ntdll" ascii wide
    $data_directory = "DATA" ascii wide
    $resource_directory = "RSRC" ascii wide
    
condition:
    $pe_header and
    (
        $import_directory or
        $import_directory2 or
        $data_directory or
        $resource_directory
    )

}




Assignment 2: File Analysis

Evidence 1: System file 1

NAOX2
File name APHostRes.dll.mui
File size 9 KB
File type .mui
MD5 b2d6f1d76d3fadbf48c5a94419ca19eb
SHA1 a50140aa7846887ff5ea1facba246ccf3b4b252f
SHA256 a1facf4f284f23f465d070af834f57ace4bbd250c52568ac7e74267ce2529540
SSDeep NA
ImpHash NA
Packer / compiler info NA
Compile time NA
Number of Sections OX2
File Entropy 5.1941
Packer/Encryption Detected? NA
File extension match Magic Header? ox5A4D
New Exe Header Value oxBo

Evidence 1: System file 2

NAOX2
File name cdosys.dll.mui
File size 34.5 KB
File type .mui
MD5 4c42940eba51e81dad399f185181247b
SHA1 dd09d32a2c5d8915adee929fed9b3ebbaa186ea8
SHA256 a8502d75a3e5af75199a5ce0fb10f85a379af3ce3ce4b04dcc44731497a1959b
SSDeep NA
ImpHash NA
Packer / compiler info NA
Compile time NA
Number of Sections OX2
File Entropy 4.6218
Packer/Encryption Detected? NA
File extension match Magic Header? 0x5A4D
New Exe Header Value 0xB0

Evidence 1: System file 3

NAOX2
File name comctl32.dll.mui
File size 5 KB
File type .mui
MD5 9a4f0bc86552d548db7174388c2d0398
SHA1 c608684f26e791f4930c72743f8f72368945d03f
SHA256 e5090ad836cdb7cdab5c7e4748117c371218d39ce5e395f25386da5169a55ffc
SSDeep NA
ImpHash NA
Packer / compiler info NA
Compile time NA
Number of Sections OX2
File Entropy 3.8501
Packer/Encryption Detected? NA
File extension match Magic Header? 0x5A4D
New Exe Header Value 0xB0

Evidence 1: System file 4

NAOX2
File name comdlg32.dll.mui
File size 44 KB
File type .mui
MD5 51bf41c750a1527c167a54fc5046bc20
SHA1 e518ae156855cf7f08002d0274aa645de2033111
SHA256 ecc08ccfc4bfcf913323c5650468422197940dd34ecb7ab7e28e53dbf99ad6e6
SSDeep NA
ImpHash NA
Packer / compiler info NA
Compile time NA
Number of Sections OX2
File Entropy 4.3144
Packer/Encryption Detected? NA
File extension match Magic Header? 0x5A4D
New Exe Header Value 0xB0

Evidence 1: System file 5

NAOX2
File name Windows.Media.Speech.UXRes.dll.mui
File size 6.5 KB
File type .mui
MD5 4f55758e2b5d9a814a7fb7e08fb5d58b
SHA1 92de62d664e3c99dab8f6ce8d33392d1850d98aa
SHA256 1feae3acb89cdab97dc2aa10479f2900c999847e2ae87cb9dfe7cb95b06db586
SSDeep NA
ImpHash NA
Packer / compiler info NA
Compile time NA
Number of Sections OX2
File Entropy 4.2541
Packer/Encryption Detected? NA
File extension match Magic Header? 0x5A4D
New Exe Header Value 0xB0



Assignment 2: Malware Motes

{46199F81-DB19-4914-A16E-655646649959}

Evidence 1: System file 1

What indicators of compromise are associated with this malware?

  1. A PDF with a .exe file in the same file location is suspicious. The fact its in a zipped file indicates an attempt to get around windows defender.

What functionality does the malware appear to have if executed?

  1. It creates a directory and sets a file in schedule tasks. My assumption based on the information relayed by Browmal would be that this is likely a c2c server setup malware. IF I am incorrect then it is a Remote Access Trojan. Svchost is an actual windows system process which according to [pcrisk.com](http://pcrisk.com/) can be infected or malware can be made to look like a legitimate service
⚠️ **GitHub.com Fallback** ⚠️