Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Lab 15-2 Solutions
Дальше: Lab 16-1 Solutions

.

  • The filename used by the program is spoolsrv.exe.

  • .

    .

    .

    .

    as code, and has chosen instead to represent it as a series of DWORDs. Place your cursor on the first DWORD and press the C key to change this into code.

    to code, it is displayed as shown in .

    unlinks the structured exception handler and removes the exception record from the stack. The last line of the code is an anti-disassembly countermeasure in the form of an inward-pointing jmp instruction at . Convert the jmp to data by placing your cursor at 0x4014D7 and pressing the D key. Then select line 0x004014D8 and convert it to code with the C key.

    After correcting the anti-disassembly countermeasure shown in , we see that the rest of the code is properly disassembled with a call to URLDownloadToFileA, seen at in .

    sss
    sss

    © RuTLib.com 2015-2018