Malware Samples - PMA Chapter 10

28 Feb 2026

The behavior of malware that operate in the kernel space, such as rootkits, is not observable with user-level dynamic analysis tools like OllyDbg. To analyze malicious drivers and other kernel-level malware dynamically, a debugger must be used that can be attached to the OS itself. Chapter 10 of Practical Malware Analysis covers the use of WinDbg to accomplish this analysis.

The book uses a Windows XP VM for these labs, but I opted to use Windows 10 which requires a different setup that I covered in this write-up. In addition to this setup, I also needed to run the following command in order to load unsigned drivers:

Also, the Window 7 drivers for samples 1 and 3 from the PMA GitHub repo had to be used.

Samples:

  1. Malware Sample 1
  2. Malware Sample 2
  3. Malware Sample 3

Questions:

  1. Does this program make any direct changes to the registry? (Use procmon to check)
  2. The user-space program calls the ControlService function. Can you set a breakpoint with WinDbg to see what is executed in the kernel as a result of the call to ControlService?
  3. What does this program do?

Questions:

  1. Does this program create any files? If so, what are they?
  2. Does this program have a kernel component?
  3. What does this program do?

Feedback is welcome and encouraged! Please leave a comment below: