Malware Analysis Flashcards

1
Q

In InfoSec and Malware Analysis, what is sheep dipping?

A

the analysis of suspicious files, incoming messages, etc., for malware. The users isolate the sheep-dipped computer from other computers on the network to block any malware from entering the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some tasks that are run during the sheep dipping process.

A
  • Run user, group permission, and process monitors
  • Run port and network monitors
  • Run device driver and file monitors
  • Run registry and kernel monitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A tool that provides information about the files in the organization such as the full path of the file, date of creation, date of modification, file size, file attributes, file version, and extension to compare similar files and identify any changes to the data

A

HashMyFile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of computer software that detects and analyzes malicious code threats such as viruses, worms, and Trojans. It is used along with sheep dip computers.

A

Antivirus Sensor Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A process of reverse engineering a specific piece of malware to determine its origin, functionality, and potential impact

A

Malware Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A phishing tool used to phish user credentials from various social networking platforms such as Instagram, Facebook, Twitter, and LinkedIn. It also displays the victim system’s public IP address, browser information, hostname, geolocation, and other information

A

ShellPhish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A giant neighborhood watch scheme, empowering the most alert and most expert members to defend everyone within the community against phishing attacks. Provides updated information about sites that users visit regularly and blocks dangerous sites

A

Netcraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Restricts access to files, folders, and drivers by locking, hiding, or password-protecting them. Attackers can thus use this tool for these purposes. With this program, nobody can access or destroy the attacker’s data without a password

A

Gilisoft Filelock Pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a tool to check active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics, and IPv6 statistics.

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a tool to extract the embedded strings in the file into a readable format

A

Bintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

going through the executable binary code without actually executing it to have a better understanding of the malware and its purpose

A

Static malware analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool with the following characteristics
Reliable capture of process details, including image path, command line, user and session ID.
Configurable and moveable columns for any event property.
Filters can be set for any data field, including fields not configured as columns.
Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data.
Process tree tool shows the relationship of all processes referenced in a trace.
Native log format preserves all data for loading in a different Process Monitor instance

A

Process Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

taking a snapshot of the system at the time the malware analysis begins

A

System Baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The .dll file used by the Zeus Trojan to access and manipulate Service Manager and Registry on a victim machine

A

Advapi32.dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

used to detect suspicious startup programs and processes

A

Startup Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

used examine the changes made to the system’s registry by malware

A

Registry Monitoring

17
Q

used to scan for suspicious processes

A

Process monitoring

18
Q

traces malicious services initiated by the malware. Since malware employs rootkit techniques to manipulate HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services registry keys to hide its processes, windows service monitoring can be used to identify such manipulations.

A

Windows services monitoring

19
Q

online services can a security analyst upload the suspicious file to identify whether the file is a genuine one or a malicious one

A

Virustotal.com

20
Q

also called behavioral analysis and involves executing malware code to determine how it interacts with a host system as well as its impact on the system after infection

A

Dynamic Malware Analysis

21
Q

techniques is used to compute the hash value for a given binary code to uniquely identify malware or periodically verify changes made to the binary code during analysis

A

File fingerprinting

22
Q

file dependencies is a networking DLL that helps connect to a network or perform network-related tasks

A

WSock32.dll or Ws2_32.dll

23
Q

tools helps an attacker in performing malware disassembly

A

Ghirda

24
Q

Ransomware that uses the RSA-2048 asymmetric encryption technique

A

SamSam

25
Q

Ransomware that uses a combination of the RSA and AES algorithms to encrypt files

A

WannaCry

26
Q

Ransomware that encrypts files using an AES 256 algorithm. The AES key is also encrypted with an RSA 1024

A

Dharma

27
Q

Ransomware that uses RC4 and RSA algorithms for encryption

A

Cerber

28
Q

While preparing testbeds for malware analysis,a technique used to manually perform dynamic analysis

A

Sandbox

29
Q

PE file contains instructions and program code that the CPU executes

A

.text

30
Q

A host integrity monitoring technique that can be adopted for components that perform security operations, such as firewall systems, IDS/IPS, web servers, and authentication servers

A

Event log monitoring

31
Q

A computer installed with port monitoring, file monitoring, network monitoring, and antivirus software and connected to network only under strictly controlled conditions is known as

A

Sheep Dip

32
Q

going through the executable binary code without actually executing it to have a better understanding of the malware and its purpose

A

Static malware analysis