Practical Malware Analysis #2
Published:
Pages 20-30
The first five or so pages go over the PE header and some key information to be aware of, such as the different sections and certain values which can help with malware analysis. A good tool for view .rsrc section info is mentioned resource hacker.
- Time Date Stamp IMAGE_FILE_HEADER - tells when the executable was compiled (can be easily manipulated)
- Subsystem IMAGE_OPTIONAL_HEADER - will essentially tell us if the program is gui or console based
- Section headers describe info about a pe files sections - the rarely change - easily identifiable if the program has been packed as these values can be different
Quick rundown of PE sections
- .text - contains executable code (usually only executable section)
- .rdata - read only data
- .data - global data not just read only
- .idata - sometimes present stores import info - if not present import info stored in .rdata
- .edata - sometimes present and stores export info - if not present export info stored in .rdata
- .pdata - x64 only stores exception handling info
- .rsrc - resource info e.g. icon files
- .reloc stores information needed for relocations
I will update this blog further soon once I've completed the first lab