• LOGIN
  • No products in the cart.

Word documents, PDFs, photos, and other types of files that are infected with viruses endanger the security of your system every day and cause more computers to be infected. By observing this training course, you will learn how to identify and eliminate the malware that maliciously interact with your files.


Course duration: 12 hours (12 CPE points awarded on course completion) 

Course is pre-recorded, self-paced

Course launch: June 12th 2018


ONLY 4 SEATS LEFT WITH THE EARLY BIRD DISCOUNT! 


What will you learn?

  • Gain knowledge of malware and cyber attacks
  • MS Office and PDF document structure
  • Related malware analysis terminologies
  • Performing static analysis
  • Performing dynamic and runtime analysis
  • Conduct a deep analysis of malicious documents to detect their behavior and command and control server

What skills will you gain?

  • How to analyze malware, with strong focus on suspicious documents

What will you need?

  • A PC or laptop with virtualization environment

What should you know before you join?

  • Basic knowledge of security
  • Basic knowledge and experience of Linux


Sign up for course updates >>


About your instructor: Ali Abdollahi

 

I’m Ali Abdollahi. I’m a network and cyber security consultant. I have experience in carrier-grade networks and security technology. I‘ve worked in telecom and enterprise companies to secure and optimize their infrastructure and services. I have also done many projects on penetration testing and malware analysis in other sectors.

 

 


Syllabus


Module 1


Topic 1: Introduction to malware

Talk about types of malware related to malicious documents and how they work in this world. In this module, you will learn about malware and different types of them. These days, it’s really important to have deep knowledge about malware and their procedures.

  • What is malware?
  • Types of malware
  • How are they dangerous?
  • Malware history

Exercises:

  • Show some real examples of a malware attack using malicious documents

Topic 2: Spreading techniques

In this section, we will talk about threat actors’ techniques to spread their malicious documents.

  • Why threat actors are using spreading techniques
  • Deep analysis on spreading techniques
  • Social engineering
  • Using worms
  • Mass email campaign
  • Real world scenario

Exercises:

  • Show some real examples of threat actors using spreading techniques
  • Related exploits for spreading techniques
  • Related social engineering example

Topic 3: Attack scenarios

In this section, we will talk about the scenario that threat actors use to infect victims with malicious documents. The main section of detection and threat hunting in cyberspace is to know about the scenarios and cyber-attack kill chain.

  • Importance of documents for threat actors
  • General malware attack scenarios
  • MS Office Attack purpose
  • MS Office Attack scenario
  • MS Office Attack vectors

Exercises:

  • Show real examples and criminal operations with threat actors using malicious document.

Topic 4: Indicators of Compromise (IoC) and YARA

IoCs are critical components that a malware analyst can get from the test. In this section, we will cover all the basics of IoC and show some examples. After that, as a primary tool to use and develop the IoCs, we will cover all necessary topics related to YARA.

  • What is IoC and its usage?
  • Review some malware IoCs
  • YARA Fundamentals
  • How YARA uses IoC
  • YARA rules examples
  • YARA procedures and functionalities

Exercises:

  • We will learn the importance of IoC for malware hunters
  • Analyze some malicious documents with YARA
  • YARA rules development for malicious document detection

Topic 5: MS Office structure

In this section, we will talk about Microsoft Office document architecture, components, features and functionalities. As a malware hunter, it’s necessary to have deep knowledge about Office document structure and procedures. Good understanding of Office documents will help and clear your path in this course and its challenges.

  • General architecture of MS Office documents
  • Analyzing structures
  • Deep dive on storage formats
  • VBA functions and how it works

Topic 6: MS Office static analysis
In this section, we will talk about static analysis procedures, tools and tricks.

  • Deep dive on source code
  • Go through document strings
  • Engaging metadata via exiftool
  • Extracting VBA codes and macro via OLEtools

Exercises:

  • Static analysis on malicious Office document

Topics 7: MS Office dynamic analysis

In this section, we will talk about dynamic analysis procedures, tools and tricks.

  • Sandboxing
  • Setting up a fake internet connection
  • Detecting the malicious behaviors
  • Tricking macros via VBA emulation engine
  • Network base analysis
  • Detecting C2 server
  • Use some online resources

Exercises:

  • Dynamic analysis on malicious Office document

Module 2 


Topic 8: PDF document structure

In this section, we will talk about PDF document architecture, components, features and functionalities. As a malware hunter, it’s necessary to have deep knowledge about PDF document structure and procedures. Good vision of PDF documents will help and clear your path in this course and its challenges.

  • General architecture of PDF documents
  • PDF keyword
  • PDF objects
  • PDF data
  • Malicious Javascript

Topic 9: PDF document static analysis

In this section, we will talk about static analysis procedures, tools and tricks.

  • Extracting PDF object via pdfid
  • Parsing a PDF file via pdf-parser
  • Engaging metadata via exiftool
  • Extracting suspicious codes and scripts

Exercises:

  • Static analysis on malicious PDF documents

Topic 10: PDF document dynamic analysis

In this section, we will talk about dynamic analysis procedures, tools and tricks.

  • Regshooting
  • Detecting the malicious behaviors with Windows shellcode analyzer and PDF dumper
  • Detect C2 server and payload
  • Use some online resources

Exercises:

  • Dynamic analysis on malicious PDF documents

Topic 11: Obfuscation

In this section, we will cover threat actor techniques to hide their activity and data.

  • What is obfuscation?
  • Types of obfuscation
  • Obfuscation techniques
  • Challenges with obfuscation

Exercises:

  • In this lab, we will engage with an obfuscated malicious document

Module 3 


Topic 12: Other malicious tricks

Time to learn a little bit about other tricks that threat actors use to defend against malware hunters. If you want to fight against threat actors, you should know their tricks. This section will help you learn about the hackers’ tips and tricks and a walkthrough to discover them.

  • Evasion techniques
  • Anti-VM
  • Anti-Sandbox
  • Packing
  • Crypter

Exercises:

  • Show some real scenarios and defending solutions

Topic 13: Debugging

In this section, we will cover how to disassemble and autopsy a malicious document with some debuggers. As a malware analyst, you must have knowledge of debuggers and use them to autopsy the malware. Furthermore, we will learn the fundamentals and terms about debuggers. After that, we will jump into finding interesting values about a malicious document.

  • Necessity of debuggers in malware hunting
  • Debuggers’ benefits for malware analysts
  • Necessary parameters that we will gather via debuggers

Exercises:

  • Warming up with some well-known debuggers
  • Working with a specific debugger for documents
  • Use vipermonkey to extract interesting things, like URL, operations and so on.

Final exam

The exam includes two parts. First is a written exam based on fundamentals and terminologies and the second one is a real malware analyst scenario. You should hunt the IoCs and other useful information from a malicious document and write a report.


Course format: 

  • The course is self-paced – you can visit the training whenever you want and your content will be there.
  • Once you’re in, you keep access forever, even when you finish the course.
  • There are no deadlines, except for the ones you set for yourself.
  • We designed the course so that a diligent student will need about 12 hours of work to complete the training.
  • The course contains video and text materials, accompanied by practical labs and exercises.

Questions? Contact our course coordinator Marta at [email protected]

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSECOURSE STARTS IN 3 weeks
  • $149.00 $129.00
  • 3 weeksSTARTS IN
  • UNLIMITED ACCESS
  • Course Certificate
52 STUDENTS ENROLLED

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

Who’s Online

There are no users currently online

Certificate Code

eForensics Magazine's online courses are conducted by experts on our online platform. Courses are designed for hackers, pentesters, IT security experts – professionals and ethusiasts alike. During the course you will not only learn the material and gain the skill, you will also get the unique opportunity to train under the supervision of some of the best experts out there.

The courses are self-paced, and are available on demand. When the course is in session, we release new materials every week, but you can always join in and catch up – when the session ends, everything stays on the website. The added benefit of participating in a session is the hands-on guidance you get from the instructor!

flexible approach; instructor's guidance; course certificate; 18 CPE points for every completed course;

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013