Dynamic analysis of malwares with API Monitor
This blog post aims to show how you can dynamically analyse Windows malwares using API Monitor. One of the great benefits is that you can take a look at each API calls. You can even breakpoint on them, and edit the value before and after the call. Custom malware For learning purpose, we will write a basic Windows malware which will: Check the presence of a hardcoded registry key. If not present, the execution is stopped....