SlideShare a Scribd company logo
Forensic Analysis and Malware Analysis Workstaiton
For analyzing malicious URLs. suspect Office documents or PDFs, executable, or analyzing disk images , the SANS SIFT Workstaion with
Remnux tools will be used.
This is a virtual machine installed with a suite of tools needed to analyze these items. Although there are hundreds of too ls, not all of
them are necessary for high-level malware or forensic analysis.
Below are the groupings of the tools for their specific purpose, as well as 2 flow charts indicating in what order and what output is to be
expected from each tool.
Also, there are 3 .dd images , a suspicious Office document, a malicious PDF, and an Trojan executable installed on the SAN SIFT
workstation in order to practice the skills and utilization of the tools.
Malware Analysis and Forensic Analysis of Images Tool List
Manta Ray – Image Analysis and Deleted File Recovery
Autopsy – Forensic Image Analysis and Filre recovery
Kibana – Log Timeline Analysis
Bokken –URL and File TEsting
UPX – For unpacking malware
Pyew – File and PDF Analysis for Malware
PEScan – Windows Executable Analysis
Procdot – dynamic malware Analysis
Thug – URL collection and analysis
Burp Suite – URL Analysis and Collection
Olevba.py – embedded macros in Office documents
BE Viewer – gathers information off of forensic images
Strings – pulls cleartext from files
GHEX – For viewing raw hexadecimal view of files and images
Scalpel – For pulling data off of images via command line or parsing damaged images
- Forensics
o Mantaray – recovers deleted files, creates timelines
o Autopsy – Analysis of Forensic Images
o BEViewer– Bulk_extractor – pulls email addresses, phone numbers, URLs
o Scalpel – For analyzing images or damaged files not viewable in Autopsy or Mantaray
o Log2Timeline/Plaso – part of Mantaray
o GHEX
- Malware analysis
o Suspicious URL
 Thug.py www.yahoo.com - FZM ……output to var/log/thug
 Burpsuite
 JSDetox
o Static
 Bokken - GUI Interface that can analyze the following:
 Websites
 Executables
 PDF Files
 PEScan – Scans executables and provides information
 PEFrame
 Pyew
 Commands
o Pyew.imports – more details on malware
o Urls – will show URLs inside a piece of malware
o Packer – will show if the malware is “packed”
o Threat – sends the MD5 has to Virustotal
o Pdfview – only for using pyew to analyze PDF Files
 UPX
 Ghex
o Document Analysis
 Olevba.py – for Office Document Macros
 JSDetox – For Obfuscated Java Script
 PDFxtract – For PDF
 Peepdf –I – PDF Document Analysis
 Pyew – PDF and Windows Executable Analysis
 Swfdump – to pull .swf files out of PDF files
o Dynamic
- Need a VM to infect
- Need to tailor VM so that the malware does not detect this as a VM for analysis
Static Analysis of Suspicious URLs and Malware Flowchart
Is this an executable, URL,
Offfice Doc, or PDF?
URL
Use thug.py -FZM
www.xxxxxx.com to pull the
website and analyze
Executable
Use PEFrame and Pyew to
Analyze Is it packed?
Unpack using UPX or
another tool
Use" strings" to find
Cleartext
Use XORSearch or No
MoreXOR to find hidden
strings
Office Document
Use olevba.py to find
suspicious macros
PDF
Use"pyew" to analyze
Use "pdfview" option to
view any suspicious
Javascript
May need to use JS-Detox
to de-obfuscate Javascript
Forensic Analysis of Workstation Image
Obtain Disk Image via
ExternalMedia
DVD or External USB
Determine Format
Determine Partion for
Analysis
mmls command
FTK
Image type from Forensic
Toolkit Imager
DD
Autopsy
GUI Interface, retrieves
deleted files
GHEX
Raw Look at Files and Disk
Images
Scalpel
Command-Line..for damaged
or unmountable images
Mantaray
GUI Interface
Supertimeline
Pulls all logs and creates a
timeline of activity
Forefront
Recovers deleted files and
separates tehm into folders
Bulk_Extractor
BEViewer - extracts emails, URLs,
telephone numberes...etc from
images
For mounting a .dd
image, right-click
and chooseDrive
Mounter
VMDK
Virtual Machine Image

More Related Content

DOCX
Static malware analysis sop
PPT
Computer Forensics & Windows Registry
PPT
Defcon 18: FOCA 2
PPTX
FOCA 2.5.5 Training
PPTX
Foca training hackcon6
PPT
Registry Forensics
PPS
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
PPTX
Buffer Overflow Demo by Saurabh Sharma
Static malware analysis sop
Computer Forensics & Windows Registry
Defcon 18: FOCA 2
FOCA 2.5.5 Training
Foca training hackcon6
Registry Forensics
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Buffer Overflow Demo by Saurabh Sharma

What's hot (9)

PDF
Osquery
PPT
Owasp Hacker Secrets Barcamp
PDF
'Malware Analysis' by PP Singh
PDF
Windows Registry Analysis
PPTX
The Power of FOCA 3
PDF
Buffer overflow null
PDF
2600 v08 n1 (spring 1991)
PPTX
Advanced malwareanalysis training session2 botnet analysis part1
PDF
MindMap - Forensics Windows Registry Cheat Sheet
Osquery
Owasp Hacker Secrets Barcamp
'Malware Analysis' by PP Singh
Windows Registry Analysis
The Power of FOCA 3
Buffer overflow null
2600 v08 n1 (spring 1991)
Advanced malwareanalysis training session2 botnet analysis part1
MindMap - Forensics Windows Registry Cheat Sheet
Ad

Similar to Malware analysis and forensic analysis of images (20)

PPTX
Malware analysis
PDF
Project in malware analysis:C2C
PDF
Free Computer Forensic Software's list - by Forensic Control
PDF
Memory forensics cheat sheet
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PDF
Malware Analysis -an overview by PP Singh
PPTX
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
PDF
the Cyber - Forensics - Lab - Manual . pdf
PDF
Autopsy 3.0 - Open Source Digital Forensics Conference
PDF
Intro2 malwareanalysisshort
PPTX
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
PPTX
Basic malware analysis
PDF
Memory Forensic CheatSheet - SANS Institute
PDF
PPTX
Malware Static Analysis
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
DOCX
Digital forensics
PDF
H@dfex 2015 malware analysis
PPTX
Introduction to Malware Analysis
PPTX
Malware analysis as a hobby (Owasp Göteborg)
Malware analysis
Project in malware analysis:C2C
Free Computer Forensic Software's list - by Forensic Control
Memory forensics cheat sheet
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Malware Analysis -an overview by PP Singh
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documents
the Cyber - Forensics - Lab - Manual . pdf
Autopsy 3.0 - Open Source Digital Forensics Conference
Intro2 malwareanalysisshort
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Basic malware analysis
Memory Forensic CheatSheet - SANS Institute
Malware Static Analysis
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Digital forensics
H@dfex 2015 malware analysis
Introduction to Malware Analysis
Malware analysis as a hobby (Owasp Göteborg)
Ad

Recently uploaded (20)

PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PDF
Mega Projects Data Mega Projects Data
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
Computer network topology notes for revision
PPTX
Introduction to machine learning and Linear Models
PDF
Foundation of Data Science unit number two notes
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Business Acumen Training GuidePresentation.pptx
climate analysis of Dhaka ,Banglades.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Introduction-to-Cloud-ComputingFinal.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Introduction to Knowledge Engineering Part 1
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Mega Projects Data Mega Projects Data
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
ISS -ESG Data flows What is ESG and HowHow
oil_refinery_comprehensive_20250804084928 (1).pptx
Computer network topology notes for revision
Introduction to machine learning and Linear Models
Foundation of Data Science unit number two notes

Malware analysis and forensic analysis of images

  • 1. Forensic Analysis and Malware Analysis Workstaiton For analyzing malicious URLs. suspect Office documents or PDFs, executable, or analyzing disk images , the SANS SIFT Workstaion with Remnux tools will be used. This is a virtual machine installed with a suite of tools needed to analyze these items. Although there are hundreds of too ls, not all of them are necessary for high-level malware or forensic analysis. Below are the groupings of the tools for their specific purpose, as well as 2 flow charts indicating in what order and what output is to be expected from each tool. Also, there are 3 .dd images , a suspicious Office document, a malicious PDF, and an Trojan executable installed on the SAN SIFT workstation in order to practice the skills and utilization of the tools. Malware Analysis and Forensic Analysis of Images Tool List Manta Ray – Image Analysis and Deleted File Recovery Autopsy – Forensic Image Analysis and Filre recovery Kibana – Log Timeline Analysis Bokken –URL and File TEsting UPX – For unpacking malware Pyew – File and PDF Analysis for Malware PEScan – Windows Executable Analysis Procdot – dynamic malware Analysis Thug – URL collection and analysis Burp Suite – URL Analysis and Collection Olevba.py – embedded macros in Office documents BE Viewer – gathers information off of forensic images Strings – pulls cleartext from files GHEX – For viewing raw hexadecimal view of files and images Scalpel – For pulling data off of images via command line or parsing damaged images - Forensics o Mantaray – recovers deleted files, creates timelines o Autopsy – Analysis of Forensic Images o BEViewer– Bulk_extractor – pulls email addresses, phone numbers, URLs o Scalpel – For analyzing images or damaged files not viewable in Autopsy or Mantaray o Log2Timeline/Plaso – part of Mantaray
  • 2. o GHEX - Malware analysis o Suspicious URL  Thug.py www.yahoo.com - FZM ……output to var/log/thug  Burpsuite  JSDetox o Static  Bokken - GUI Interface that can analyze the following:  Websites  Executables  PDF Files  PEScan – Scans executables and provides information  PEFrame  Pyew  Commands o Pyew.imports – more details on malware o Urls – will show URLs inside a piece of malware o Packer – will show if the malware is “packed” o Threat – sends the MD5 has to Virustotal o Pdfview – only for using pyew to analyze PDF Files  UPX  Ghex o Document Analysis  Olevba.py – for Office Document Macros  JSDetox – For Obfuscated Java Script  PDFxtract – For PDF  Peepdf –I – PDF Document Analysis  Pyew – PDF and Windows Executable Analysis  Swfdump – to pull .swf files out of PDF files o Dynamic - Need a VM to infect - Need to tailor VM so that the malware does not detect this as a VM for analysis
  • 3. Static Analysis of Suspicious URLs and Malware Flowchart Is this an executable, URL, Offfice Doc, or PDF? URL Use thug.py -FZM www.xxxxxx.com to pull the website and analyze Executable Use PEFrame and Pyew to Analyze Is it packed? Unpack using UPX or another tool Use" strings" to find Cleartext Use XORSearch or No MoreXOR to find hidden strings Office Document Use olevba.py to find suspicious macros PDF Use"pyew" to analyze Use "pdfview" option to view any suspicious Javascript May need to use JS-Detox to de-obfuscate Javascript
  • 4. Forensic Analysis of Workstation Image Obtain Disk Image via ExternalMedia DVD or External USB Determine Format Determine Partion for Analysis mmls command FTK Image type from Forensic Toolkit Imager DD Autopsy GUI Interface, retrieves deleted files GHEX Raw Look at Files and Disk Images Scalpel Command-Line..for damaged or unmountable images Mantaray GUI Interface Supertimeline Pulls all logs and creates a timeline of activity Forefront Recovers deleted files and separates tehm into folders Bulk_Extractor BEViewer - extracts emails, URLs, telephone numberes...etc from images For mounting a .dd image, right-click and chooseDrive Mounter VMDK Virtual Machine Image