Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
In this lab, you will take on the role of a cybersecurity analyst tasked with examining a suspicious .exe
file. Your job is to decompile the file, identify malicious behavior, and sanitize the binary. Only if the fix is successful will you obtain the validation flag.
In this lab you will learn:
.NET
executables👉 This challenge is solved inside a preconfigured Windows virtual machine.
1https:/cybersecurity-machines/metadata-investigation-lab.ova
Import the machine into VirtualBox.
Log in as the user student:4geeks-lab
. The machine comes preinstalled with tools such as:
dnSpyEx
(decompiler and binary editor).NET SDK
The executable appears to be designed to perform a malicious action before allowing its execution to complete. However, there is an opportunity: if you can correctly identify and remove this unauthorized activity, the program will behave legitimately and display a technical result that allows you to validate the challenge. The executable is currently on the desktop, named Suspicious.exe
.
Open the executable in dnSpyEx
and analyze the Main()
method.
Identify the section of code that performs a malicious action. This could be unauthorized writing, analysis evasion, or environment manipulation.
Remove that malicious logic.
Pass the protected execution conditions. The executable contains an environment validation based on a file.
Recompile the corrected executable as Suspicious_FIXED.exe
.
Run the fixed binary. If everything was corrected successfully, the program will print a diagnostic result containing the flag.
Are you ready to think like a real reverse engineering analyst?
Good luck, Analyst!
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis
Difficulty
intermediate
Average duration
1 hrs
Technologies
windows
cybersecurity
blue-team
reverse-engineering
malware-analysis