Analyzing calc.exe and Network Activity
1. Analysis of calc.exe Process
Initial Observations:
The process creation for
calc.exeinvolves several preliminary operations, such as initiating the program and loading libraries.Focus on searching for specific file names related to the sample, such as
badfile.exe, to trace its creation and usage.
TCP Connections:
Look for TCP connections before the
badfile.execreation. This indicates data was received, which was then stored inbadfile.exe.
2. Network Traffic Analysis with Wireshark
Setup:
Use the loopback interface with FakeNet instead of the Ethernet interface.
Capturing Traffic:
Run the sample and capture network traffic with Wireshark.
Analyzing Traffic:
Filter HTTP Traffic:
Go to
Statistics>Protocol Hierarchyand focus on HTTP traffic.Apply filter to show only HTTP packets.
Inspect Requests:
Follow the HTTP stream to view GET requests and identify URLs from which data was downloaded.
Example: Find GET requests for files like
evil.exefrom specific domains (e.g.,abadsite.com).
3. Using AutoRuns for Persistence Detection
Setup:
Open
re_test_dlx.docand enable content if needed.
AutoRuns Analysis:
Check Persistence:
Look for entries such as a registry run key pointing to
badfile.exe.This indicates that the malware has set up persistence, ensuring it runs at login.
Identify Trigger Points:
AutoRuns lists potential persistence mechanisms that malware might use, which helps in identifying how the malware maintains its presence.
Summary
calc.exeProcess: Focus on tracking the creation and operations of related files, likebadfile.exe, and monitor network activities that reveal data sources.Wireshark: Use it to detect and analyze network traffic, identifying any URLs or network addresses involved in data downloads.
AutoRuns: Check for persistence mechanisms to determine how malware ensures it runs on system startup.
Last updated