Malware Samples - PMA Chapter 7

07 Jan 2026

This chapter covers some features of the Windows OS that are commonly exploited by malware such as the NT Namespace, registry, services, mutexes, Windows/Native APIs, and Microsoft's Component Object Model (COM).

Samples:

  1. Malware Sample 1
  2. Malware Sample 2
  3. Malware Sample 3

Questions:

  1. How does this program ensure that it continues running (achieves persistence) when the computer is restarted?
  2. Why does this program use a mutex?
  3. What is a good host-based signature to use for detecting this program?
  4. What is a good network-based signature for detecting this malware?
  5. What is the purpose of this program?
  6. When will this program finish executing?

Questions:

  1. How does this program achieve persistence?
  2. What is the purpose of this program?
  3. When will this program finish executing?

Questions:

  1. How does this program achieve persistence to ensure that it continues running when the computer is restarted?
  2. What are two good host-based signatures for this malware?
  3. What is the purpose of this program?
  4. How could you remove this malware once it is installed?



Conclusion

The first and third labs in this chapter demonstrated two different ways malware can establish persistence. The first was a fairly straightforward method that created a malicious service, however analyzing the third was much more involved! The second sample demonstrated how COM objects can be used to disguise malicious functionality and taught me a lot more about Windows internals. These labs pushed my analysis skills to the limit! I am also beginning to understand the preference many analysts have for IDA over Ghidra.


Feedback is welcome and encouraged! Please leave a comment below: