_genuine
July 23rd, 2012, 23:21
Hi ladies,
Im analyzing a piece of malware, I've been able to document its behavior and also been able to clean it from the system quite easily, my next course of action is to analyze the code to document 'how' it does its magic. The first approach id like to take it to see if i can get a clean dump of the process, it uses the persistence method of an autorun entry replacing itself with taskman on logon in the registry, it also hides its executable from the disk. (Which can be retrieved using GMER). The executable it packed or obfiscated, which is why i'd like to see if i can get a running dump of the file. The problem is, on boot up, the process only briefl appears and then its gone. doing its thing in silence. My question is, is there a tool out there that can be used to dump a file on bootup? or can you guys give some advice as to how you would get a dump of this file that only briefly starts on boot up on the system ( by boot i mean on logon) Thanks for any insights.
Im analyzing a piece of malware, I've been able to document its behavior and also been able to clean it from the system quite easily, my next course of action is to analyze the code to document 'how' it does its magic. The first approach id like to take it to see if i can get a clean dump of the process, it uses the persistence method of an autorun entry replacing itself with taskman on logon in the registry, it also hides its executable from the disk. (Which can be retrieved using GMER). The executable it packed or obfiscated, which is why i'd like to see if i can get a running dump of the file. The problem is, on boot up, the process only briefl appears and then its gone. doing its thing in silence. My question is, is there a tool out there that can be used to dump a file on bootup? or can you guys give some advice as to how you would get a dump of this file that only briefly starts on boot up on the system ( by boot i mean on logon) Thanks for any insights.