Google Updater DLL Side load Analysis

Заказчик: AI | Опубликовано: 26.12.2025

Assignment: Analysis of DLL side-loading attack on Google Updater DeadLine: 31/12/25 write a report documenting the outcome of each step. Link: https://drive.google.com/drive/folders/15e2oCqpY46EEes_G-zsy1vaq2VNyuyaH A sample for analysis is available on the lab VM image in the folder: “c:\STUDENT_LABS\Lab5 - Reverse Engineering\”. Execute the steps below (the exact order is up to you) and Open the given file in the IDA disassembler and/or other tools. Perform static and dynamic analysis of each dropped file (including Noew.SAM). Provide evidence for static and dynamic analysis and malicious activity and IoCs in the results of the analysis (for example, screenshots with associated explanations). The analysis must cover the following three files: Noew.SAM, google.dll and google.exe for this you have to perform static dynamic analysis and malicious activity and IoC Describe the files dropped. What is the purpose of the dropped files? (Perform Static and Dynamic analysis) with screenshots The report must document the outcome of each analysis step. Screenshots must be clearly labeled and referenced.