Malware Quiz
Malware Quiz
Malware Quiz
3-how would you debug a DLL function for dynamic analysis? Check all boxes that apply
A.simply run the DLL from command line or by double-clicking
B.write a simple C loader
C.use rundll32.exe
D.user cmd.exe
12-how can you run and debug a shellcode? Check all boxes that apply
A.just run the malware, shellcode will execute to debug
B.using scdbg tool to debug the shellcode and extract functions calls
C.simple C program, place the shellcode in an array, and call it with a function pointer
D.with a DLL loader
14-which instruction does shellcode often use to push all registers on the stack?
A.noop
B.push
C.put
D.db
15-what libraries are always loaded, regardless of the PE header ? Check all boxes that apply
A.kernel32.dll
B.winnt.dll
C.ntdll.dll
D.user32.dll
16-how can you know that one class inherits from another one?
A.the mother class owns the daughter methods
B.the mother class constructor is called by the daughter
C.the daughter class name is prefixed by mother class
D.all methods are the same between classes
19-how can a malware detect a debugger? Check all boxes that apply
A.IsDebuggerPresent
B.Detection of usage of CreateRemoteThread()
C.when there is a debugger, malware will not load
D.Breakpoint detection (0xCC)
20-what does this assembly do?
Begin:
Call next
Db "VirtualAlloc", 0
Next:
Pop eax
A.it places the address of virtualalloc in eax
B.it erases virtualalloc
C.it calls function virtualalloc with EAX in parameter
D.it removes content of EAX