#2 How To Analyse a Malicious Word Document

Поділитися
Вставка
  • Опубліковано 15 січ 2025

КОМЕНТАРІ • 47

  • @migry
    @migry 9 місяців тому +1

    Found your channel after searching for Ghidra, but decided to watch from your first video. This one was very interesting!

  • @vikalpdutttripathi
    @vikalpdutttripathi 3 роки тому +2

    Haven't found any better video than this on Malware Analysis. Keep up the good work mate👍

    • @0xf0x
      @0xf0x  3 роки тому +1

      Thanks mate really appreciate it, always great to hear people get something out of these

  • @sulthansk6444
    @sulthansk6444 4 роки тому +1

    I am unaware of(inetsim & fakedns)
    Now I understand the complete concept through your video
    Thanks for the video...

    • @0xf0x
      @0xf0x  4 роки тому +1

      That’s awesome to hear, thanks for the feedback 👍

    • @sulthansk6444
      @sulthansk6444 4 роки тому

      @@0xf0x please post more videos on malwares...

  • @michaelk8642
    @michaelk8642 3 роки тому +1

    Very informative video. Curious of the types of tools used to study malware and you explained and gave examples very well. Thanks.

    • @0xf0x
      @0xf0x  3 роки тому

      No probs, always great to hear the videos are well received and useful

  • @one_shot_phill2368
    @one_shot_phill2368 4 роки тому +1

    Brilliant video, you’ve got me hooked!

  • @aijaz5830
    @aijaz5830 4 роки тому +1

    Man this was such an amazing video. Keep posting such quality content

    • @0xf0x
      @0xf0x  4 роки тому

      Glad to hear it, thanks for watching 👍

  • @SquareZeroGaming
    @SquareZeroGaming 2 роки тому

    Amazing Content!!

  • @derrickshaffer7206
    @derrickshaffer7206 3 роки тому +1

    How do you get the suspicious file into your lab safely? If you're in host-only mode you can't transfer it from a web source. I assume you want to keep the VM isolated from the host so you can't copy via drag and drop. So what method do you recommend using for transferring those files into your lab?

    • @0xf0x
      @0xf0x  3 роки тому +1

      Zip and password protect any malicious files, you can then safely transfer them to your lab, I use drag and drop. If you want to download from a web source such as app.any.run then switch the VM to NAT mode so it has an internet connection and then switch back to host only mode when done.

  • @张逸凡-l7h
    @张逸凡-l7h 2 роки тому

    Excellent work! Possible to share configuration of inetsim.conf please? I failed all the time and want to compare. Thanks!

  • @Amm9
    @Amm9 3 роки тому +1

    Great video! Just subscribed.

  • @surajsawant6469
    @surajsawant6469 4 роки тому +1

    Well elaborated but I didn't get how you jumped to powershell.exe (13.25) when it was not really a child process by word document process. please explain if possible.

    • @0xf0x
      @0xf0x  4 роки тому +3

      Great question, any processes such as cmd.exe and powershell.exe that can be used to execute code will always be of interest in this type of scenario. I knew I hadn’t launched powershell so based on that I knew the document must have launched it to do something malicious.

    • @surajsawant6469
      @surajsawant6469 4 роки тому +2

      @@0xf0x Ohh...thanks a lot for the quick response and clarification. will wait for upcoming vids. :) keep it up.

    • @sagibersodsky731
      @sagibersodsky731 4 роки тому +2

      Hello, I Did a Debug to such files. It seems that the macro uses Win32_ProcessStartup and Win32_Process, those are Classes that can be used for running Powershell Throught WmiPrvse.exe. It is Very Well Documented here - www.bromium.com/wp-content/uploads/2019/07/Bromium-Emotet-Technical-Analysis-Report.pdf. HAVE FUN :)

  • @mustafahussien4410
    @mustafahussien4410 4 роки тому +1

    Perfect, Well Done

  • @azoz8608
    @azoz8608 4 роки тому +1

    Very good explanation. keep it up :)

    • @0xf0x
      @0xf0x  4 роки тому

      Thanks!

  • @nitinmaurya6835
    @nitinmaurya6835 3 роки тому

    Hey Hi, thanks for the great video tutorial. I am starting with your playlist. Just got stuck at process monitor step. how did you find out that powershell is running in this particular svchost.exe ?

    • @0xf0x
      @0xf0x  3 роки тому

      Hey, I saw PowerShell in the process tree in ProcMon. As I hadn’t launched PowerShell and know it can be used for RCE I knew it was going to be something that the Word document had launched 👍

  • @ahmetpayasloglu7134
    @ahmetpayasloglu7134 3 роки тому

    When your network setting is host only , how did you download this malware sample ? Thank you.

    • @0xf0x
      @0xf0x  3 роки тому +1

      Switch to NAT from host only mode. In video #1 I keep two snapshots saved of my VM, 1 in host only and one in NAT mode

    • @ahmetpayasloglu7134
      @ahmetpayasloglu7134 3 роки тому

      @@0xf0x Thank you for answer.

  • @venkateshs3411
    @venkateshs3411 4 роки тому

    Hey , I dont understand a thing , how did you get the response 200 on since you are host only ? , Since you are on clean-Host there must be no internet connection , right ? IF you are not on Host-only ,then how did you transfer using winscp?

    • @0xf0x
      @0xf0x  4 роки тому

      All the network traffic is being forwarded onto the Remnux VM. Inetsim is running on Remnux which is emulating a number services on specific ports such as http on port 80. That’s why I get a 200 response.

    • @venkateshs3411
      @venkateshs3411 4 роки тому

      @@0xf0x Thanks for your response , i tried to deobfuscate the macros in this Emotet , but there is some wired appears Code : Fack = Xhrcwkmbidam.Diwqqciyfbjs.Tag
      Yaiciqbtusvb = Split(Tvsghavnh + LTrim(LTrim(Fack)), "///") i cannot find Diwqqciyfbjs in the function Xhrcwkmbidam , , can you help me ?

  • @metehandagl9068
    @metehandagl9068 3 роки тому

    Man thank your for the video. But I didn't understand that why you used NAT setting. You didn't use host only. You had a internet connection. Is it safe? Because the malware can spread to your host machine.

    • @0xf0x
      @0xf0x  3 роки тому

      Thanks man glad you liked it. I definitely had host only mode in place in this video, that’s why the traffic routed to the Remnux machine 👍

    • @metehandagl9068
      @metehandagl9068 3 роки тому

      @@0xf0x thank you for the answer man, but I don't understand that, you was searching on the google and downloading files. How do you do this with host only man? Can you explain for me , thank you .

    • @0xf0x
      @0xf0x  3 роки тому +1

      @@metehandagl9068 No probs, I was searching on the internet using my host machine. The Guest VM was host only

    • @metehandagl9068
      @metehandagl9068 3 роки тому

      @@0xf0x I got it man . Thank you so much. We are waiting for your new excellent videos!

    • @0xf0x
      @0xf0x  3 роки тому

      @@metehandagl9068 Cheers, i will try and get some out soon. Life has been a bit crazy the past few months.

  • @eladbruchim2148
    @eladbruchim2148 4 роки тому

    the link for the download of the macro file didn't work, but great video.

    • @0xf0x
      @0xf0x  4 роки тому +1

      Thanks for flagging will check this tomorrow 👍

    • @eladbruchim2148
      @eladbruchim2148 4 роки тому

      @@0xf0x thanks

    • @0xf0x
      @0xf0x  4 роки тому +1

      Link now updated in video description

    • @eladbruchim2148
      @eladbruchim2148 4 роки тому +1

      @@0xf0x I really appreciate it thanks for the reply and the effort

  • @Randomdude-i8x
    @Randomdude-i8x 2 роки тому

    You can just unzip the file and inspect the inner xml's. You do not need fancy tools. I would not recommend just opening it and looking for network traffic unless you really know what you are doing.

    • @0xf0x
      @0xf0x  2 роки тому

      The idea of the video is to safely demo how to use malware analysis tools and give people an understanding of what the document is doing behind the scenes.

  • @D_Tech_And_Trek
    @D_Tech_And_Trek 4 роки тому +1

    Most likely Emotet!

    • @0xf0x
      @0xf0x  4 роки тому

      Correct 👍