Introduction to malwares
AbdessabourAROUSCritical InfrastructionsMonitoring Team -tunCERT 
abdessabour.arous[x40]ansi.tn
Introduction to malwares
Introduction to malwares
CERT DEPT 
TECHNICAL DEPT 
AUDIT DEPT
Detect attacks 
Investigate 
Notify / Alert 
Help / Assist
Monday 
Analyst 1 
Tech 1 
Tech 2 
Tuesday 
Wednesday 
8 -10 
10 -12 
12 -14 
14 -16 
16 -18 
18 -20 
Shift system
Prime ministerwebsite: 
http://www.pm.gov.tn 
Central Bank: 
http://www.bct.gov.tn 
Justice minister: 
http://www.e-justice.tn 
193.X.X.X 
196.X.X.X 
Domain Name System: DNS 
Mailing:SMTP and POP/IMAP
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
not disinfectable
0x004FF3FE 
Original PE 
PE afterinfection 
Injectedcode 
_IMAGE_OPTIONAL_HEADER 
0x0040A0FE 
0x0040A0FE 
0x004FF3FE 
_main 
_main 
_IMAGE_NT_HEADERS 
AddressOfEntryPoint 
EntryPoint 
EntryPoint 
PE Header
.textsection 
Section Table 
NT Header 
DOS Header 
othersections 
.data section 
.relocsection 
.relocsection 
UnmappedData 
.textsection 
Section Table 
NT Header 
DOS Header 
.data section 
Othersections 
HigherOffets 
HigherOffets 
PE File 
In memory
0x004FF3FE 
Gentleman  
Destructive 
0x0040A0FE 
_main 
_main 
Code 
Code 
Injectedcode 
Injectedcode 
Vs
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Name/ Year 
Propagation 
CodeRed(2001) 
14 Heures 
Slammer(2003) 
30 minutes 
P-o-C(2005-2007) 
1 seconde
36% 
32% 
10% 
4% 
18% 
Product / Exploit by Kaspersky 2011 
Adobe Reader 
JAVA 
Android 
Flash 
Others
Introduction to malwares
Introduction to malwares
Introduction to malwares
 
 
 
 
 
 
 
 
 
 
 

Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Object Manager 
Process/ Thread 
Memory Manager 
Hardware Abstraction Layer 
Ke(Scheduler) 
Security Ref 
Driver … 
OS / 2 
I/O Manager 
POSIX 
WIN 32 
Application 
Application 
Application 
Application 
Application 
Application 
Application 
Services 
NTDLL 
ConfManager 
Cache Manager
Call ReadFile(…,…, …) 
Call NtReadFile(…,…, ...) 
Return to the caller 
int2E or SYSENTER or SYSCALL 
Call NtReadFile(…, …, ...) 
Dismiss interrupt 
Execute the operation 
Return to the caller
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Estonia 
Russia 
* From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
GeorgiaRussia 
* From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
United States of America 
Iran 
* From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
Introduction to malwares
S7otbxdx.dll 
M117: L LW0 
L 164 
<= 
SPBN M101 
M117: L LW0 
L 164 
Injected STEP 
7 Code 
Original 
Instructions 
New DLL
Introduction to malwares
Introduction to malwares
Introduction to malwares

More Related Content

PDF
End of Studies project: Malware Repsonse Center
PDF
Hunting Lateral Movement in Windows Infrastructure
PDF
Ceh v8 labs module 05 system hacking
PPT
Black Energy18 - Russian botnet package analysis
PDF
MNSEC 2018 - Windows forensics
PDF
A Stuxnet for Mainframes
PDF
Finfisher- Nguyễn Chấn Việt
PDF
Ceh v8 labs module 03 scanning networks
End of Studies project: Malware Repsonse Center
Hunting Lateral Movement in Windows Infrastructure
Ceh v8 labs module 05 system hacking
Black Energy18 - Russian botnet package analysis
MNSEC 2018 - Windows forensics
A Stuxnet for Mainframes
Finfisher- Nguyễn Chấn Việt
Ceh v8 labs module 03 scanning networks

What's hot (20)

PPTX
Malware Analysis and Defeating using Virtual Machines
PPTX
Indicators of compromise: From malware analysis to eradication
PDF
Hunting malware via memory forensics
PPT
Building HMI with VB Tutorial [1998]
ODP
Malware analysis - What to learn from your invaders
PPTX
Kheirkhabarov24052017_phdays7
PPTX
Living off the land and fileless attack techniques
PDF
Shusei tomonaga pac_sec_20171026
PPTX
Basic malware analysis
PPTX
PDF
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
PPTX
A walk through Windows firewall and Netsh commands
PPTX
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
PPTX
Malware analysis
PDF
Атаки на платформу Java Card с использованием вредоносных апплетов
PPTX
Горизонтальные перемещения в инфраструктуре Windows
PPTX
Advanced malware analysis training session4 anti-analysis techniques
PPTX
Top 10 Latest Viruses
PPTX
How to drive a malware analyst crazy
PDF
Assingment 5 - ENSA
Malware Analysis and Defeating using Virtual Machines
Indicators of compromise: From malware analysis to eradication
Hunting malware via memory forensics
Building HMI with VB Tutorial [1998]
Malware analysis - What to learn from your invaders
Kheirkhabarov24052017_phdays7
Living off the land and fileless attack techniques
Shusei tomonaga pac_sec_20171026
Basic malware analysis
Ir alert-med-17-093-01 c-intrusions-affecting_multiple_victims_across_multipl...
A walk through Windows firewall and Netsh commands
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Malware analysis
Атаки на платформу Java Card с использованием вредоносных апплетов
Горизонтальные перемещения в инфраструктуре Windows
Advanced malware analysis training session4 anti-analysis techniques
Top 10 Latest Viruses
How to drive a malware analyst crazy
Assingment 5 - ENSA
Ad

Similar to Introduction to malwares (20)

PDF
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
PDF
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
PPT
Stuxnet dc9723
PDF
Strategies to design FUD malware
PDF
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
PPTX
Solve the colocation conundrum: Performance and density at scale with Kubernetes
PDF
MKAD_black_V2
PDF
Assessing cybersecurity_Anto Veldre
PPT
Hacking and Computer Forensics
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PPTX
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
PDF
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
PDF
An overview of unix rootkits
PPT
PDF
A client-side vulnerability under the microscope!
PPTX
Infrastructure Attacks - The Next generation, ESET LLC
PPT
Contiki introduction II-from what to how
PPTX
Nullbyte 6ed. 2019
PDF
DPDK & Layer 4 Packet Processing
PDF
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
Stuxnet dc9723
Strategies to design FUD malware
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Solve the colocation conundrum: Performance and density at scale with Kubernetes
MKAD_black_V2
Assessing cybersecurity_Anto Veldre
Hacking and Computer Forensics
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
An overview of unix rootkits
A client-side vulnerability under the microscope!
Infrastructure Attacks - The Next generation, ESET LLC
Contiki introduction II-from what to how
Nullbyte 6ed. 2019
DPDK & Layer 4 Packet Processing
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
Ad

Recently uploaded (20)

PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPT
Geologic Time for studying geology for geologist
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
Build Your First AI Agent with UiPath.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TEXTILE technology diploma scope and career opportunities
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
STKI Israel Market Study 2025 version august
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Consumable AI The What, Why & How for Small Teams.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
Custom Battery Pack Design Considerations for Performance and Safety
giants, standing on the shoulders of - by Daniel Stenberg
Geologic Time for studying geology for geologist
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Basics of Cloud Computing - Cloud Ecosystem
Flame analysis and combustion estimation using large language and vision assi...
Convolutional neural network based encoder-decoder for efficient real-time ob...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Training Program for knowledge in solar cell and solar industry
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

Introduction to malwares

  • 2. AbdessabourAROUSCritical InfrastructionsMonitoring Team -tunCERT abdessabour.arous[x40]ansi.tn
  • 5. CERT DEPT TECHNICAL DEPT AUDIT DEPT
  • 6. Detect attacks Investigate Notify / Alert Help / Assist
  • 7. Monday Analyst 1 Tech 1 Tech 2 Tuesday Wednesday 8 -10 10 -12 12 -14 14 -16 16 -18 18 -20 Shift system
  • 8. Prime ministerwebsite: http://www.pm.gov.tn Central Bank: http://www.bct.gov.tn Justice minister: http://www.e-justice.tn 193.X.X.X 196.X.X.X Domain Name System: DNS Mailing:SMTP and POP/IMAP
  • 20. 0x004FF3FE Original PE PE afterinfection Injectedcode _IMAGE_OPTIONAL_HEADER 0x0040A0FE 0x0040A0FE 0x004FF3FE _main _main _IMAGE_NT_HEADERS AddressOfEntryPoint EntryPoint EntryPoint PE Header
  • 21. .textsection Section Table NT Header DOS Header othersections .data section .relocsection .relocsection UnmappedData .textsection Section Table NT Header DOS Header .data section Othersections HigherOffets HigherOffets PE File In memory
  • 22. 0x004FF3FE Gentleman  Destructive 0x0040A0FE _main _main Code Code Injectedcode Injectedcode Vs
  • 40. Name/ Year Propagation CodeRed(2001) 14 Heures Slammer(2003) 30 minutes P-o-C(2005-2007) 1 seconde
  • 41. 36% 32% 10% 4% 18% Product / Exploit by Kaspersky 2011 Adobe Reader JAVA Android Flash Others
  • 45.            
  • 56. Object Manager Process/ Thread Memory Manager Hardware Abstraction Layer Ke(Scheduler) Security Ref Driver … OS / 2 I/O Manager POSIX WIN 32 Application Application Application Application Application Application Application Services NTDLL ConfManager Cache Manager
  • 57. Call ReadFile(…,…, …) Call NtReadFile(…,…, ...) Return to the caller int2E or SYSENTER or SYSCALL Call NtReadFile(…, …, ...) Dismiss interrupt Execute the operation Return to the caller
  • 65. Estonia Russia * From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
  • 66. GeorgiaRussia * From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
  • 67. United States of America Iran * From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Scott J. Shackelford
  • 73. S7otbxdx.dll M117: L LW0 L 164 <= SPBN M101 M117: L LW0 L 164 Injected STEP 7 Code Original Instructions New DLL