SlideShare a Scribd company logo
Practical Malware Analysis
Ch 1: Malware Analysis Primer
The Goals of Malware Analysis
Incident Response
• Case history
– A medical clinic with 10 offices found malware on
one of their workstations
– Hired a consultant to clean & re-image that
machine
• All done—case closed?
Incident Response
• After malware is found, you need to know
– Did an attacker implant a rootkit or trojan on your
systems?
– Is the attacker really gone?
– What did the attacker steal or add?
– How did the attack get in
• Root-cause analysis
• Link Ch 1a
Malware Analysis
• Dissecting malware to understand
– How it works
– How to identify it
– How to defeat or eliminate it
• A critical part of incident response
The Goals of Malware Analysis
• Information required to respond to a network
intrusion
– Exactly what happened
– Ensure you’ve located all infected machines and
files
– How to measure and contain the damage
– Find signatures for intrusion detection systems
Signatures
• Host-based signatures
– Identify files or registry keys on a victim computer
that indicate an infection
– Focus on what the malware did to the system, not
the malware itself
• Different from antivirus signature
• Network signatures
– Detect malware by analyzing network traffic
– More effective when made using malware analysis
False Positives
Malware Analysis Techniques
Static v. Dynamic Analysis
• Static Analysis
– Examines malware without running it
– Tools: VirusTotal, strings, a disassembler like IDA Pro
• Dynamic Analysis
– Run the malware and monitor its effect
– Use a virtual machine and take snapshots
– Tools: RegShot, Process Monitor, Process Hacker,
CaptureBAT
– RAM Analysis: Mandant Redline and Volatility
Basic Analysis
• Basic static analysis
– View malware without looking at instructions
– Tools: VirusTotal, strings
– Quick and easy but fails for advanced malware
and can miss important behavior
• Basic dynamic analysis
– Easy but requires a safe test environment
– Not effective on all malware
Advanced Analysis
• Advanced static analysis
– Reverse-engineering with a disassembler
– Complex, requires understanding of assembly
code
• Advanced Dynamic Analysis
– Run code in a debugger
– Examines internal state of a running malicious
executable
Types of Malware
Types of Malware
• Backdoor
– Allows attacker to control the system
• Botnet
– All infected computers receive instructions from
the same Command-and-Control (C&C) server
• Downloader
– Malicious code that exists only to download other
malicious code
– Used when attacker first gains access
Types of Malware
• Information-stealing malware
– Sniffers, keyloggers, password hash grabbers
• Launcher
– Malicious program used to launch other malicious
programs
– Often uses nontraditional techniques to ensure stealth
or greater access to a system
• Rootkit
– Malware that conceals the existence of other code
– Usually paired with a backdoor
Types of Malware
• Scareware
– Frightens user into buying something
– Link Ch 1b
Types of Malware
• Spam-sending malware
– Attacker rents machine to spammers
• Worms or viruses
– Malicious code that can copy itself and infect
additional computers
Mass v. Targeted Malware
• Mass malware
– Intended to infect as many machines as possible
– Most common type
• Targeted malware
– Tailored to a specific target
– Very difficult to detect, prevent, and remove
– Requires advanced analysis
– Ex: Stuxnet
General Rules for Malware
Analysis
General Rules for Malware Analysis
• Don’t Get Caught in Details
– You don’t need to understand 100% of the code
– Focus on key features
• Try Several Tools
– If one tool fails, try another
– Don’t get stuck on a hard issue, move along
• Malware authors are constantly raising the bar
Ch 2: Basic Static Analysis
Techniques
• Antivirus scanning
• Hashes
• A file’s strings, functions, and headers
Antivirus Scanning
Only a First Step
• Malware can easily change its signature and
fool the antivirus
• VirusTotal is convenient, but using it may alert
attackers that they’ve been caught
– Link Ch 2a
Hashing
A fingerprint for malware
Hashes
• MD5 or SHA-1
• Condenses a file of any size down to a fixed-
length fingerprint
• Uniquely identifies a file well in practice
– There are MD5 collisions but they are not
common
– Collision: two different files with the same hash
HashCalc
Hash Uses
• Label a malware file
• Share the hash with other analysts to identify
malware
• Search the hash online to see if someone else
has already identified the file
Finding Strings
Strings
• Any sequence of printable characters is a
string
• Strings are terminated by a null (0x00)
• ASCII characters are 8 bits long
– Now called ANSI
• Unicode characters are 16 bits long
– Microsoft calls them "wide characters"
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
The strings Command
• Native in Linux, also available for Windows
• Finds all strings in a file 3 or more characters
long
The strings Command
• Bold items can be ignored
• GetLayout and SetLayout are Windows
functions
• GDI32.DLL
is a
Dynamic
Link
Library
Packed and Obfuscated Malware
Packing Files
• The code is compressed, like a Zip file
• This makes the strings and instructions unreadable
• All you'll see is the wrapper – small code that
unpacks the file when it is run
Detecting Packers with PEiD
Demo: UPX
Packing Obfuscates Strings
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Portable Executable File Format
EXE Files
PE Files
• Used by Windows executable files, object
code, and DLLs
• A data structure that contains the information
necessary for Windows to load the file
• Almost every file executed on Windows is in
PE format
PE Header
• Information about the code
• Type of application
• Required library functions
• Space requirements
LordPE Demo
Main Sections
There are
a lot more
sections
• But the
main ones
are enough
for now
• Link Ch 2c
Linked Libraries and Functions
Imports
• Functions used by a program that are stored
in a different program, such as library
• Connected to the main EXE by Linking
• Can be linked three ways
– Statically
– At Runtime
– Dynamically
Static Linking
• Rarely used for Windows executables
• Common in Unix and Linux
• All code from the library is copied into the
executable
• Makes executable large in size
Runtime Linking
• Unpopular in friendly programs
• Common in malware, especially packed or
obfuscated malware
• Connect to libraries only when needed, not
when the program starts
• Most commonly done with the LoadLibrary
and GetProcAddress functions
Dynamic Linking
• Most common method
• Host OS searches for necessary libraries when
the program is loaded
Clues in Libraries
• The PE header lists every library and function
that will be loaded
• Their names can reveal what the program
does
• URLDownloadToFile indicates that the
program downloads something
Dependency Walker
Shows Dynamically Linked Functions
• Normal programs have a lot of DLLs
• Malware often has very few DLLs
Services.exe
Services.ex_ (malware)
Imports
&
Exports
in
Dependency
Walker
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Exports
• DLLs export functions
• EXEs import functions
• Both exports and imports are listed in the PE
header
• The book says exports are rare in EXEs, but I
see a ton of exports in innocent EXEs
Example: Keylogger
• Imports User32.dll and uses the function
SetWindowsHookEx which is a popular way
keyloggers receive keyboard inputs
• It exports LowLevelKeyboardProc and
LowLevelMouseProc to send the data
elsewhere
• It uses RegisterHotKey to define a special
keystroke like Ctrl+Shift+P to harvest the
collected data
Ex: A Packed Program
• Very few
functions
• All you
see is the
unpacker
The PE File Headers and Sections
Important PE Sections
• .text -- instructions for the CPU to execute
• .rdata -- imports & exports
• .data – global data
• .rsrc – strings, icons, images, menus
PEView (Link Ch 2e)
Time Date Stamp
• Shows when this executable was compiled
• Older programs are more likely to be known to
antivirus software
• But sometimes the date is wrong
– All Delphi programs show June 19, 1992
– Date can also be faked
IMAGE_SECTION_HEADER
• Virtual Size – RAM
• Size of Raw Data – DISK
• For .text section, normally equal, or nearly
equal
• Packed executables show Virtual Size much
larger than Size of Raw Data for .text section
Not Packed
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Resource Hacker
• Lets you browse the .rsrc section
• Strings, icons, and menus
• Link Ch 2f
Resource Hacker in Windows XP
Resource Hacker in Windows 7

More Related Content

PDF
Practical Malware Analysis: Ch 11: Malware Behavior
PPTX
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
PPT
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
PDF
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
PDF
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
PPTX
Malware Static Analysis
PPTX
Malware analysis
PPTX
Introduction to Malware Analysis
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Malware Static Analysis
Malware analysis
Introduction to Malware Analysis

What's hot (20)

PPT
Introduction to Web Application Penetration Testing
PPTX
Vulnerability assessment and penetration testing
PPT
Application Security
PPTX
Footprinting and reconnaissance
PPT
Malware Analysis Made Simple
PPTX
Malware & Anti-Malware
PDF
Web application security & Testing
PPTX
Web application security
PPTX
Owasp top 10 vulnerabilities
PPTX
System Security-Chapter 1
ODP
Ethical hacking ppt
PPTX
Introduction to penetration testing
PPTX
Penetration testing reporting and methodology
PDF
Secure Code Review 101
PPTX
User authentication
 
PDF
Api security-testing
PPTX
Penetration Testing
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Intrusion detection
 
PDF
Threat hunting 101 by Sandeep Singh
Introduction to Web Application Penetration Testing
Vulnerability assessment and penetration testing
Application Security
Footprinting and reconnaissance
Malware Analysis Made Simple
Malware & Anti-Malware
Web application security & Testing
Web application security
Owasp top 10 vulnerabilities
System Security-Chapter 1
Ethical hacking ppt
Introduction to penetration testing
Penetration testing reporting and methodology
Secure Code Review 101
User authentication
 
Api security-testing
Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Intrusion detection
 
Threat hunting 101 by Sandeep Singh
Ad

Viewers also liked (9)

PDF
The Security Circus
PPTX
Malware- Types, Detection and Future
PPTX
Malware
PPT
Introduction to Malware
ODP
Viruses andthreats@dharmesh
PPT
Computer Malware
PPTX
Malware ppt
PPT
Malware
The Security Circus
Malware- Types, Detection and Future
Malware
Introduction to Malware
Viruses andthreats@dharmesh
Computer Malware
Malware ppt
Malware
Ad

Similar to Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques (20)

PDF
Malware Analysis for cyber security & Network Security
DOC
Cutting out Malware
PDF
CHAPTER 2 BASIC ANALYSIS.pdf
PPT
CHAPTER 2 BASIC ANALYSIS.ppt
PDF
CH1- Introduction to malware analysis-v2.pdf
PDF
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
PPT
Chapter 1 malware analysis primer
PDF
Malware analysis _ Threat Intelligence Morocco
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PDF
CNIT 126: Ch 2 & 3
PPTX
Concepts of Malicious Windows Programs
PPT
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
PDF
Keith J. Jones, Ph.D. - Crash Course malware analysis
PPT
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Malware 101 by saurabh chaudhary
PDF
Introduction to Malware analysis
PPTX
Introduction To Malware Analysis.pptx
PPTX
Introduction To Malware Analysis.pptx
PPTX
Basic Dynamic Analysis of Malware
Malware Analysis for cyber security & Network Security
Cutting out Malware
CHAPTER 2 BASIC ANALYSIS.pdf
CHAPTER 2 BASIC ANALYSIS.ppt
CH1- Introduction to malware analysis-v2.pdf
CHAPTER 1 MALWARE ANALYSIS PRIMER.pdf
Chapter 1 malware analysis primer
Malware analysis _ Threat Intelligence Morocco
Cyber Defense Forensic Analyst - Real World Hands-on Examples
CNIT 126: Ch 2 & 3
Concepts of Malicious Windows Programs
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
Keith J. Jones, Ph.D. - Crash Course malware analysis
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
Malware and Anti-Malware Seminar by Benny Czarny
Malware 101 by saurabh chaudhary
Introduction to Malware analysis
Introduction To Malware Analysis.pptx
Introduction To Malware Analysis.pptx
Basic Dynamic Analysis of Malware

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
102 student loan defaulters named and shamed – Is someone you know on the list?
TR - Agricultural Crops Production NC III.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static Techniques

  • 1. Practical Malware Analysis Ch 1: Malware Analysis Primer
  • 2. The Goals of Malware Analysis
  • 3. Incident Response • Case history – A medical clinic with 10 offices found malware on one of their workstations – Hired a consultant to clean & re-image that machine • All done—case closed?
  • 4. Incident Response • After malware is found, you need to know – Did an attacker implant a rootkit or trojan on your systems? – Is the attacker really gone? – What did the attacker steal or add? – How did the attack get in • Root-cause analysis
  • 6. Malware Analysis • Dissecting malware to understand – How it works – How to identify it – How to defeat or eliminate it • A critical part of incident response
  • 7. The Goals of Malware Analysis • Information required to respond to a network intrusion – Exactly what happened – Ensure you’ve located all infected machines and files – How to measure and contain the damage – Find signatures for intrusion detection systems
  • 8. Signatures • Host-based signatures – Identify files or registry keys on a victim computer that indicate an infection – Focus on what the malware did to the system, not the malware itself • Different from antivirus signature • Network signatures – Detect malware by analyzing network traffic – More effective when made using malware analysis
  • 11. Static v. Dynamic Analysis • Static Analysis – Examines malware without running it – Tools: VirusTotal, strings, a disassembler like IDA Pro • Dynamic Analysis – Run the malware and monitor its effect – Use a virtual machine and take snapshots – Tools: RegShot, Process Monitor, Process Hacker, CaptureBAT – RAM Analysis: Mandant Redline and Volatility
  • 12. Basic Analysis • Basic static analysis – View malware without looking at instructions – Tools: VirusTotal, strings – Quick and easy but fails for advanced malware and can miss important behavior • Basic dynamic analysis – Easy but requires a safe test environment – Not effective on all malware
  • 13. Advanced Analysis • Advanced static analysis – Reverse-engineering with a disassembler – Complex, requires understanding of assembly code • Advanced Dynamic Analysis – Run code in a debugger – Examines internal state of a running malicious executable
  • 15. Types of Malware • Backdoor – Allows attacker to control the system • Botnet – All infected computers receive instructions from the same Command-and-Control (C&C) server • Downloader – Malicious code that exists only to download other malicious code – Used when attacker first gains access
  • 16. Types of Malware • Information-stealing malware – Sniffers, keyloggers, password hash grabbers • Launcher – Malicious program used to launch other malicious programs – Often uses nontraditional techniques to ensure stealth or greater access to a system • Rootkit – Malware that conceals the existence of other code – Usually paired with a backdoor
  • 17. Types of Malware • Scareware – Frightens user into buying something – Link Ch 1b
  • 18. Types of Malware • Spam-sending malware – Attacker rents machine to spammers • Worms or viruses – Malicious code that can copy itself and infect additional computers
  • 19. Mass v. Targeted Malware • Mass malware – Intended to infect as many machines as possible – Most common type • Targeted malware – Tailored to a specific target – Very difficult to detect, prevent, and remove – Requires advanced analysis – Ex: Stuxnet
  • 20. General Rules for Malware Analysis
  • 21. General Rules for Malware Analysis • Don’t Get Caught in Details – You don’t need to understand 100% of the code – Focus on key features • Try Several Tools – If one tool fails, try another – Don’t get stuck on a hard issue, move along • Malware authors are constantly raising the bar
  • 22. Ch 2: Basic Static Analysis
  • 23. Techniques • Antivirus scanning • Hashes • A file’s strings, functions, and headers
  • 25. Only a First Step • Malware can easily change its signature and fool the antivirus • VirusTotal is convenient, but using it may alert attackers that they’ve been caught – Link Ch 2a
  • 27. Hashes • MD5 or SHA-1 • Condenses a file of any size down to a fixed- length fingerprint • Uniquely identifies a file well in practice – There are MD5 collisions but they are not common – Collision: two different files with the same hash
  • 29. Hash Uses • Label a malware file • Share the hash with other analysts to identify malware • Search the hash online to see if someone else has already identified the file
  • 31. Strings • Any sequence of printable characters is a string • Strings are terminated by a null (0x00) • ASCII characters are 8 bits long – Now called ANSI • Unicode characters are 16 bits long – Microsoft calls them "wide characters"
  • 33. The strings Command • Native in Linux, also available for Windows • Finds all strings in a file 3 or more characters long
  • 34. The strings Command • Bold items can be ignored • GetLayout and SetLayout are Windows functions • GDI32.DLL is a Dynamic Link Library
  • 36. Packing Files • The code is compressed, like a Zip file • This makes the strings and instructions unreadable • All you'll see is the wrapper – small code that unpacks the file when it is run
  • 41. Portable Executable File Format EXE Files
  • 42. PE Files • Used by Windows executable files, object code, and DLLs • A data structure that contains the information necessary for Windows to load the file • Almost every file executed on Windows is in PE format
  • 43. PE Header • Information about the code • Type of application • Required library functions • Space requirements
  • 46. There are a lot more sections • But the main ones are enough for now • Link Ch 2c
  • 47. Linked Libraries and Functions
  • 48. Imports • Functions used by a program that are stored in a different program, such as library • Connected to the main EXE by Linking • Can be linked three ways – Statically – At Runtime – Dynamically
  • 49. Static Linking • Rarely used for Windows executables • Common in Unix and Linux • All code from the library is copied into the executable • Makes executable large in size
  • 50. Runtime Linking • Unpopular in friendly programs • Common in malware, especially packed or obfuscated malware • Connect to libraries only when needed, not when the program starts • Most commonly done with the LoadLibrary and GetProcAddress functions
  • 51. Dynamic Linking • Most common method • Host OS searches for necessary libraries when the program is loaded
  • 52. Clues in Libraries • The PE header lists every library and function that will be loaded • Their names can reveal what the program does • URLDownloadToFile indicates that the program downloads something
  • 54. Shows Dynamically Linked Functions • Normal programs have a lot of DLLs • Malware often has very few DLLs
  • 60. Exports • DLLs export functions • EXEs import functions • Both exports and imports are listed in the PE header • The book says exports are rare in EXEs, but I see a ton of exports in innocent EXEs
  • 61. Example: Keylogger • Imports User32.dll and uses the function SetWindowsHookEx which is a popular way keyloggers receive keyboard inputs • It exports LowLevelKeyboardProc and LowLevelMouseProc to send the data elsewhere • It uses RegisterHotKey to define a special keystroke like Ctrl+Shift+P to harvest the collected data
  • 62. Ex: A Packed Program • Very few functions • All you see is the unpacker
  • 63. The PE File Headers and Sections
  • 64. Important PE Sections • .text -- instructions for the CPU to execute • .rdata -- imports & exports • .data – global data • .rsrc – strings, icons, images, menus
  • 66. Time Date Stamp • Shows when this executable was compiled • Older programs are more likely to be known to antivirus software • But sometimes the date is wrong – All Delphi programs show June 19, 1992 – Date can also be faked
  • 67. IMAGE_SECTION_HEADER • Virtual Size – RAM • Size of Raw Data – DISK • For .text section, normally equal, or nearly equal • Packed executables show Virtual Size much larger than Size of Raw Data for .text section
  • 70. Resource Hacker • Lets you browse the .rsrc section • Strings, icons, and menus • Link Ch 2f
  • 71. Resource Hacker in Windows XP
  • 72. Resource Hacker in Windows 7