isarmadfarooq/Dynamic-Malware-Analysis-Report
GitHub: isarmadfarooq/Dynamic-Malware-Analysis-Report
一份基于FlareVM环境的恶意软件动态行为分析学术报告,系统展示了从沙箱搭建、样本执行到行为可视化的一整套分析流程与方法论。
Stars: 0 | Forks: 0
| | |
|:---:|:---|
| **Name** | Sarmad Farooq |
| **Roll No.** | 25i-7722 |
| **Program** | MS Cybersecurity (MSCY) |
| **Institution** | FAST – National University of Computer & Emerging Sciences, Islamabad |
| **Subject** | Malware Analysis |
| **Academic Year** | 2024 – 2025 |
## 📖 概述
动态分析——也称为**行为**或**运行时**分析——涉及在沙盒环境中执行恶意软件样本,并实时观察其与底层操作系统的每一次交互。与静态分析不同,这种方法绕过了混淆,直接揭示了恶意软件的真实操作意图。
**观察到的行为包括:**
- 🔄 进程创建、注入和终止事件
- 📂 文件系统读取/写入/删除操作
- 🗝️ Windows 注册表修改(持久化、配置存储)
- 🌐 网络连接尝试、DNS 查询和 C2 通信
- 💬 进程间通信和 API 调用
## 📁 仓库结构
```
📦 malware-analysis-report
┣ 📄 Dynamic_Analysis_Report_Sarmad_Farooq_Professional.docx
┗ 📄 README.md
```
## 🛠️ 工具与环境
| Tool | Developer | Role |
|:---|:---|:---|
|  | Mandiant (FireEye) | Windows security distro for malware analysis |
|  | Mandiant (FireEye) | Simulates network services; captures C2 traffic |
|  | Open Source | Registry before/after snapshot comparison |
|  | Open Source | Real-time process monitoring |
|  | Microsoft Sysinternals | Full file, registry & network event logging |
|  | CERT.at | Behavioral dependency graph visualization |
|  | Abuse.ch | Malware sample source |
## 📊 分析方法
```
┌─────────────────────────────────────────────────────────────────────┐
│ ANALYSIS PIPELINE │
│ │
│ [1] VM Snapshot → [2] Network Config → [3] Regshot 1st Shot │
│ ↓ ↓ │
│ [4] FakeNet-NG → [5] System Informer → [6] Execute Malware │
│ ↓ ↓ │
│ [7] Procmon Log → [8] Regshot 2nd Shot→ [9] Procmon Config │
│ ↓ ↓ │
│ [10] Export CSV ──────────────────────→ [11] ProcDot Graph │
└─────────────────────────────────────────────────────────────────────┘
```
| Step | Action | Tool | Purpose |
|:---:|:---|:---|:---|
| 1 | Create VM Snapshot | VMware / VirtualBox | Clean forensic baseline |
| 2 | Configure Network (Host-Only) | VM Settings | Isolate from real internet |
| 3 | First Registry Snapshot | Regshot | Capture pre-execution state |
| 4 | Launch Network Simulation | FakeNet-NG | Intercept C2 traffic |
| 5 | Start Process Monitor | System Informer | Watch process tree |
| 6 | Execute Malware Sample | `Sarmad_Malware.exe` | Trigger all behaviors |
| 7 | Capture System Events | Procmon | Log all file/registry/network ops |
| 8 | Second Registry Snapshot | Regshot | Generate registry diff |
| 9 | Configure Procmon Export | Procmon | Prepare CSV for ProcDot |
| 10 | Export Event Log | Procmon (CSV) | Structured artifact for analysis |
| 11 | Visualize Behavior | ProcDot | Behavioral dependency graph |
## 📌 主要发现
| Category | Observations |
|:---|:---|
| 🔵 **Process Behavior** | Malware process identified in System Informer; full hierarchy documented via ProcDot |
| 🌐 **Network Activity** | Outbound DNS queries and HTTP C2 connection attempts captured by FakeNet-NG |
| 🗝️ **Registry Modifications** | Multiple keys added/modified — consistent with persistence and config storage |
| 📂 **File System Operations** | Read/write/delete operations on system directories logged via Procmon filters |
| 📈 **Behavioral Graph** | ProcDot confirmed the full execution chain and malware's operational objectives |
## ⚠️ 免责声明
## 📚 参考资料
| Resource | Link |
|:---|:---|
| FlareVM | [github.com/mandiant/flare-vm](https://github.com/mandiant/flare-vm) |
| FakeNet-NG | [github.com/mandiant/flare-fakenet-ng](https://github.com/mandiant/flare-fakenet-ng) |
| Regshot | [sourceforge.net/projects/regshot](https://sourceforge.net/projects/regshot/) |
| System Informer | [systeminformer.sourceforge.io](https://systeminformer.sourceforge.io/) |
| Process Monitor | [Microsoft Sysinternals](https://learn.microsoft.com/en-us/sysinternals/downloads/procmon) |
| ProcDot | [procdot.com](https://www.procdot.com/) |
| MalwareBazaar | [bazaar.abuse.ch](https://bazaar.abuse.ch/) |
标签:DAST, FAST-NUCES, FlareVM, IP 地址批量处理, SSH蜜罐, 动态恶意软件分析, 嗅探欺骗, 学术项目, 安全报告, 恶意软件分析, 权限维持, 沙箱, 注册表修改, 网络安全, 运行时分析, 进程注入, 隐私保护