Assignment: Analysis of DLL side-loading attack on Google Updater A sample for analysis is available on the lab VM image in the folder: “c:\STUDENT_LABS\Lab5 - Reverse Engineering\”. Execute the steps below (the exact order is up to you) and write a report documenting the outcome of each step. Watch the introductory video for this lab below. Open the given file in the IDA disassembler and/or other tools. Determine the type (class) of malware. Perform static and dynamic analysis of each dropped file. Provide evidence of malicious activity and IoCs in the results of the analysis (for example, screenshot with associated explanations). Describe the files dropped. What is the purpose of the dropped files? Explain the obfuscation technique used to cover the dropped files. What is the purpose of creating 'Windows Message.lnk'? Explain how the malicious payload is executed. What is the obfuscation algorithm used to decode 'Noew.SAM'? Write pseudocode (e.g. in C, Java or Python language). Describe how the DLL side-loading technique is used in this attack. The VM details will be handed out later.