Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assignment 2 - 2 : Analyzing and Classifying Malware Objective: The primary goal of this assignment is to perform basic static analysis on the sample

Assignment 2-2: Analyzing and Classifying Malware
Objective: The primary goal of this assignment is to perform basic static analysis on the sample "WannaCry" malware identified within your network's "WannaCry" folder. Additionally, conduct dynamic analysis on the sample ransomware within a controlled virtual machine (VM) environment. It's important to refrain from copying the malware sample from the Windows VM to your personal computer, conducting all activities solely within Kali Linux and the Windows VM on Kali. Provide a detailed analysis supported by relevant screenshots.
Questions:
Your organization has encountered ransomware attacks targeting several employees due to vulnerabilities associated with EternalBlue on specific workstations and servers.
The task involves downloading a sample of the ransomware malware and executing dynamic analysis within your controlled VM environment. Ensure all analysis activities are conducted from Kali Linux and Windows VM on Kali. Remember, no copying of the malware sample to a personal computer.
Steps to Perform:
Static Analysis:
Access the "WannaCry" folder within the network.
Conduct basic static analysis on the WannaCry malware.
Take screenshots documenting key findings, including file attributes, behavior, and structure.
Dynamic Analysis:
Use Kali Linux to access the Windows VM.
Within the Windows VM on Kali, download the sample ransomware malware.
Run the malware within a controlled environment (VM).
Capture screenshots throughout the dynamic analysis process, documenting its behavior, network activities, and any identifiable changes or actions.
Analysis Report:
Compile all collected screenshots and findings into a document.
Describe the steps taken for both static and dynamic analyses.
Include screenshots highlighting critical phases of analysis, such as file details, execution, system changes, and network activity.
Write a summary outlining the malware's behavior, potential impact, and any identifiable patterns or characteristics.
Submission:
Once the analysis is complete and documented, submit the document for assessment.
wannacry.zip wannacry.zip6 January 2024,10:36 AM

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases Demystified

Authors: Andrew Oppel

1st Edition

0072253649, 9780072253641

More Books

Students also viewed these Databases questions

Question

LO5 Illustrate the steps in developing a base pay system.

Answered: 1 week ago

Question

LO3 Outline strategic compensation decisions.

Answered: 1 week ago