CSEC5003 Malware Analysis, Penetration Testing, and Incident Response Coursework Brief | DMU

Published: 05 Mar, 2025
Category Coursework Subject Computer Science
University De Montfort University Module Title CSEC5003 Malware Analysis, Penetration Testing, and Incident Response
Title of the Assessment:  Malware Investigation: Cohorts 1, 2 and 3
This coursework item is:  Summative

Tasks

In this coursework, you are expected to:

Analyse two PDF files and two specimens of malware and answer questions about the insights gained, detailing your approach with relevant evidence, e.g., screenshots, excerpts of logs, etc.

Part 1: Static and dynamic analysis of an unknown suspicious files 

This is the first part of your graded coursework and is worth 42% of your total marks. 

Scenario and goal

You have been provided with a set of unknown files found on a suspected infected machine on your organization’s network. The goal is to perform in-depth analysis of the files and document any observable characteristics and/or behaviours.

Answer all the questions below (in the analysis tasks section) backing your answers with appropriate proofs and detailed supporting documentation and evidence from analyses. Please provide your answers under each given question. Any references cited should be listed at the end of your report.

Environment and tools

Analyze the set of PDF files zipped within the “cw_pdf_files.7z” in a REMnux environment using appropriate tools. The password for unzipping is ‘infected’. Also, analyse the file “unknown.file” on a Windows XP virtual machine. The file should be extracted from “unknown.7z” with the archive password ‘infected’.

Please note that these are real malware. Which tools you use is entirely up to you. In malware analysis there is rarely one “right” path. Be creative and observant! However, I suggest you look at previous lab exercises and lectures slides, and pick whatever tools you deem appropriate. Provide documentary evidence to support your answers where appropriate, for example screenshots, excerpts from Logs, dumps and other analyses outputs. 

Analysis tasks

  1. Retrieve the two PDF documents from the “cw_pdf_files.7z” archive file. Perform a comprehensive analysis of the three files and present your findings, drawing conclusions as to whether or not each of the files may be a malicious PDF document.
  2.  Retrieve “unknown.7z” from the archive zipped file. How would you confirm what type of file it is? What observable features of the file suggests that it may/may not be packed? Document your observations with any applicable tools of your choice.
  3. 3. Next, perform a basic static analysis of the malware sample (unknown.file) and document your findings. For example, what do the imports and exports tell you about the sample? Are there any interesting strings? Can you observe anything suspicious section-wise? If the sample is packed, make sure you unpack it first.
  4. Analyse the sample (unknown.file) dynamically and monitor its activities on the system. What changes do you observe on the host? For example, is anything dropped, executed or deleted? (Hint: if you use Regshot in any phase of your analysis, set the right scan directory to ‘C:\’). Support your claims with documentary evidence from tools such as RegShot, Process Monitor, etc.
  5.  Does the sample (unknown.file) exhibit any network-based behaviour? Analyse and document any observable network activities under (a) an isolated environment and (b) with the system connected online (in this exercise it is ok to let the sample talk to the outside world). Document all observable patterns in network activities using appropriate tools and techniques.

Part 2: Analysis and reverse engineering of a malicious DLL

This is the second part of your graded coursework and is worth 40% of your total marks

Scenario and goal

Your friend received an email with an attachment and proceeded to open the email. Without being careful, your friend opened the attachment and is now concerned that the system may be infected

Answer all the questions below (in the analysis tasks section) backing your answers with appropriate proofs and detailed supporting documentation and evidence from analyses.

Environment and tools

Analyse the file “malsample.dll” on a Windows XP virtual machine. Extract it from “malsample.7z” with the archive password ‘infected’. Which tools you use is entirely up to you. In malware analysis there is rarely one “right” path. Be creative and observant! However, I suggest you look at previous lab exercises and lecture slides, and pick whatever tools you deem appropriate. Provide documentary evidence to support your answers where appropriate, for example screenshots, excerpts from Logs, dumps and other analyses outputs. Please provide your answers under each given question. Any references cited should be listed at the end of your report.

Analysis tasks

1. Your friend receives the file (malsample.dll) in an email attachment on their windows XP machine and accidentally double clicks the file. Is their system infected? If yes why/how? If no, why not? Explain and support your answer with evidence from dynamic analysis. 

2. Analyse the sample dynamically and monitor its activities on the system. Outline the steps taken to execute the sample for analysis. What changes do you observe on the host? For example, is anything dropped, executed or deleted? Any other changes to the host observed? (Hint: if you use Regshot in any phase of your analysis, be careful to set the right scan directory i.e. C:\). Support your claims with documentary evidence.

3. Under which process is the malicious DLL running? What is the process ID of this process? Document your approach and show how you obtained this information.

4. Describe how you would setup a network analysis environment. Does the malware exhibit any network-based behaviours? Analyse and document any observable network activity in an isolated environment. How does this malware behave networkwise?

5. Reverse engineer the sample with IDA/IDA pro. (a) How many functions are exported by the DLL? (b) What are the addresses of the functions that the DLL exports? (c) How many functions call the kernel32 API LoadLibrary? (d) How many times is the kernel32 API Sleep() called in the DLL? (support your answers with documentary evidence, e.g., screenshots).

6. Navigate to the ServiceMain function. 
(a) Show the graph view of the function
(b) The main subroutine (of the ServiceMain function) jumps to a location where the code calls the kernel32 API Sleep() right after the JZ assembly instruction. What is the value of the parameter used by this Sleep() call?

Part 3: Exploration of Additional Tools for Static and Dynamic Analysis

This is the third part of your graded coursework and is worth 18% of your total marks.

1. This task is to search for two additional tools, distinct from those available in the virtual machines. One tool should be used for static analysis, while the other should be for dynamic analysis. Both tools should be compatible with either Win XP or Remnux. After installing the tools, practice static and dynamic analysis using malware samples of unknown.file and/or malsample.file. Lastly, explain how the results obtained from these additional tools complement the findings from Part 1 and Part 2 of your coursework. 

2. Presentation: organization, readability, references, quality of figures, etc. [8 marks]

Looking for top-tier online assignment help from UK writers? Our experts are ready to assist you with your CSEC5003 Malware Analysis, Penetration Testing, and Incident Response Coursework. We provide comprehensive coursework help, including free assignment samples to help you grasp essential concepts. Our work is 100% plagiarism-free, ensuring that you get original content every time. With extensive experience delivering high-quality assignments for UK students, we offer unlimited assignments that align perfectly with your academic goals. You can also pay our expert to guide you through your coursework and guarantee excellent results.

Workingment Unique Features

Hire Assignment Helper Today!


PSB6008CL Innovation Management and Entrepreneurship CW1 Research Proposal Report

PSB6008CL CW1 Report: Critically evaluate the fundamental concepts of innovation and entrepreneurship in the context of local and global start-ups and existing organisations.

CM1040 Web Development Coursework 1 Brief

CM1040: In this coursework you are tasked with producing a presentation about web development. The presentation should be based on the material you have studied in the first half of the course.

PSB7003CL Entrepreneurship and Innovation Coursework 2 Written Management Report

Based on the identified organisation in your CW1, evaluate how innovation is supported and implemented through entrepreneurship practice. This includes the types of innovation evident to the organisation, the process of innovation, the implementation of innovation and how entrepreneurship and innovation is practiced.

M30029 Advanced Thermodynamics and Fluid Mechanics Coursework Brief 2024-25 | UoP

The numerical values in this coursework are based on your student number. Your student number is a six- or seven-digit code UP QWERTYZ. In the assignment below, you should replace letters Q, W, E, R, T, Y, Z with digits from your student number.

MANG6046 Optimisation and Decision Modelling Individual Coursework Brief Sem 01 | UoS

This piece of work will count for 80% of the overall mark for MANG6046. You need to submit a report of your comment on a project and an Excel file (not multiple Excel files) in two separate folders (one is called Individual Coursework_Reports Only; the other is called Individual Coursework_Excel Files.

CTEC3754D Malware Analysis Coursework Brief 2024-25 | DMU

Evaluate malware evasive techniques, e.g., packing, obfuscation, and anti-disassembly. antis and pro-boxing, etc. and how to circumvent them. Investigate, select, and apply real malware through static and dynamic analyses using standard tools and techniques.

CMP7205 Applied Statistics—PG CWK Assignment Brief 2024-25 | BCU

CMP7205 Task: Report your statistical analysis on a reasonably complex dataset(s) in a professional manner, using appropriate probabilistic and/or statistical techniques implemented with modern statistical software.

Managing Customer Experience CW1 Summative Assessment Brief | BPP University

You are required to write a 2500-word report on the customer experience (referred to as CX from now on in this brief) strategy.

Leading Through Digital Change CWK Assessment Brief | BPP

In recent decades, businesses around the world have faced challenges by the persistent stream of disruptive digital innovations (DDI). T

Leading Through Digital Change Formative CW3 Brief - BPP

LTDC CW3 : A digital transformation strategy outlines how a company will utilise digital technology to continually develop novel products, services, processes, and channels of engagement (Pratt, 2023).

Online Assignment Help in UK