Process Hollowing: a digital forensics case

This post shows how to analyze a system infected with a malware that performs Process Hollowing, in order to identify the hollowed process and to extract the malicious image from memory for further analysis. Read more...

Process Hollowing: a reverse engineering case

This is an in-depth analysis of how Process Hollowing works from the point of view of a malware (and from that of a malware analyst). While reverse-engineering a sample from the Lab 12-2 of the book Practical Malware Analysis, I’ll be showing what Process Hollowing is and how a malware can use this technique to hide itself. Read more...

Practical Malware Analysis, Lab 11-2

This is a walkthrough of the Lab 11-2 from the book Practical Malware Analysis. The sample under analysis, Lab11-02.dll, is a user-mode rootkit that performs inline hooking. The analysis of hooking mechanism is very interesting. Read more...

Practical Malware Analysis, Lab 11-1

This is a walkthrough of the Lab 11-1 from the book Practical Malware Analysis. The sample under analysis, Lab11-01.exe, is a credential stealer that performs GINA interception. Read more...

Intercepting malware traffic with Burp Proxy

Intercepting malware traffic with Burp Proxy Read more...

Malware Lab Howto: Hardening VirtualBox and the Windows VM

This is a walkthrough on how to create and “harden” a Windows VM on Virtualbox so that it is not easily detected as a VM. Read more...

Analysis of a malicious Word document

Analysis of a malicious Word document used to deliver malware via a malspam campaign. Read more...

Setting up an open-source malware analysis lab with Cuckoo

Setting up an open-source malware analysis lab with Cuckoo. Read more...

Practical Malware Analysis, Lab 3-3

This is a walkthrough of the Lab 3-3 from the book Practical Malware Analysis. The sample under analysis, Lab03-03.exe, is hiding itself as another process. Read more...

Practical Malware Analysis, Lab 3-2

This is a walkthrough of the Lab 3-2 from the book Practical Malware Analysis. The sample under analysis, Lab03-02.dll, is a malware that must be installed as a service. Read more...