Monitoring and Detection: File Analysis
In this lab, you’ll practice hunting malware with YARA and HollowsHunter (PE-Sieve). When you’re finished, you’ll have experience using open-source tooling to identify malware on disk with YARA and extract in-memory payloads with HollowsHunter. You’ll also briefly use CAPA, SpeakEasy and Floss in an automated solution to quickly grab new signatures.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Challenge
Byte scanning with YARA - The Hunt For BloodMoon
This challenge will discuss how YARA rules can be used to identify malware and how they are created. We will go over what makes a good rule and how to identify false positives. Finally, we will use some custom YARA rules to scan the filesystem for malware and upload the file to Sandblast for analysis.
Challenge
Shellcode Extraction with HollowsHunter - BloodMoon Stage2
This challenge will focus on explaining in-memory malware and how we can extract it using tools like HollowsHunter, powered by PE-Sieve. We will run HollowsHunter against the system and see if we can identify the next stage of the malware.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Fundamental understanding of software/applications and how they are used on Windows.
- Familiar with tools used to identify specific attributes of software (Strings, YARA, hashes etc..).
- Familiar with concepts of “what” is malware and why it is used by malicious actors.