Malware Samples - PMA Chapter 10

28 Feb 2026

The behavior of malware that operate in the kernel space, such as rootkits, is not observable with user-level dynamic analysis tools like OllyDbg. To analyze malicious drivers and other kernel-level malware dynamically, a debugger must be used that can be attached to the OS itself. Chapter 10 of Practical Malware Analysis covers the use of WinDbg to accomplish this type of analysis.

The book uses a Windows XP VM for these labs, but I opted to use Windows 10 which requires a different setup that I covered in this write-up.

Also, the Window 7 drivers for Samples 1 and 3 from the PMA GitHub repo had to be used. In the case of Sample 3, the Windows 7 driver still did not work and required modification.

Samples:

  1. Malware Sample 1
  2. Malware Sample 2
  3. Malware Sample 3

Questions:

  1. Does this program make any direct changes to the registry? (Use procmon to check)
  2. The user-space program calls the ControlService function. Can you set a breakpoint with WinDbg to see what is executed in the kernel as a result of the call to ControlService?
  3. What does this program do?

Questions:

  1. Does this program create any files? If so, what are they?
  2. Does this program have a kernel component?
  3. What does this program do?

Feedback is welcome and encouraged! Please leave a comment below: