Nov. 11, 2023, 1:46 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Let’s consider this snippet from decompilation of an x86 Windows binary:



The same function is called twice with the same argument and the last one doesn’t seem to use the result of the GetComputerNameExW call.

By switching to disassembly, we can see that eax is initialized before each call with a string address:



However the decompiler does not consider it, because on x86 the stack is the usual way of passing arguments and eax is most commonly just a temporary …

argument binary call called case code disassembly function malware analysis missing result week windows x86

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens