How to Do Malware Analysis?

Teilen:

Based on the findings of Malwarebytes’ Threat Review for 2022, 40 million Windows business computers’ threats were detected in 2021. In order to combat and avoid these kinds of attacks, malware analysis is essential. In this article, we will break down the goal of malicious programs’ investigation and how to do malware analysis with a sandbox.

What is malware analysis?

Malware analysis is a process of studying a malicious sample. During the study, a researcher’s goal is to understand a malicious program’s type, functions, code, and potential dangers. Receive the information organization needs to respond to the intrusion.

Results of analysis that you get:

  • how malware works: if you investigate the code of the program and its algorithm, you will be able to stop it from infecting the whole system.
  • characteristics of the program: improve detection by using data on malware like its family, type, version, etc.
  • what is the goal of malware: trigger the sample’s execution to check out what data it is targeted at, but of course, do it in a safe environment.
  • who is behind the attack: get the IPs, origin, used TTPs, and other footprints that hackers hide.
  • a plan on how to prevent this kind of attack.

Key steps of malware analysis

Across these five steps, the main focus of the investigation is to find out as much as possible about the malicious sample, the execution algorithm, and the way malware works in various scenarios.

We believe that the most effective method to analyze malicious software is to mix static and dynamic methods. Here is a short guide on how to do malware analysis. Just follow the following steps:

Interactive malware analysis

​​The modern antiviruses and firewalls couldn’t manage with unknown threats such as targeted attacks, zero-day vulnerabilities, advanced malicious programs, and dangers with unknown signatures. All these challenges can be solved by an interactive sandbox.

Interactivity is the key advantage of our service. With ANY.RUN you can work with a suspicious sample directly as if you opened it on your personal computer: click, run, print, reboot. You can work with the delayed malware execution and work out different scenarios to get effective results.

During your investigation, you can:

  • Get interactive access:work with VM as on your personal computer: use a mouse, input data, reboot the system, and open files.
  • Change the settings: pre-installed soft set, several OSs with different bitness and builds are ready for you.
  • Choose tools for your VM: FakeNet, MITM proxy, Tor, OpenVPN.
  • Research network connections:intercept packets and get a list of IP addresses.
  • Instant access to the analysis: the VM immediately starts the analysis process.
  • Monitor systems processes: observe malware behavior in real-time.
  • Collect IOCs: IP addresses, domain names, hashes, and others are available.
  • Get MITRE ATT@CK matrix: review TTP in detail.
  • Have a process graph:evaluate all processes in a graph.
  • Download a ready-made malware report: print all data in a convenient format.

All of these features help to reveal sophisticated malware and see the anatomy of the attack in real-time.

Write the “HACKERNEWS” promo code in the email subject at [email protected] and get 14 days of ANY.RUN premium subscription for free!

Try to crack malware using an interactive approach. If you use ANY.RUN sandbox, you can do malware analysis and enjoy fast results, a simple research process, investigate even sophisticated malware, and get detailed reports. Follow the steps, use smart tools and hunt malware successfully.

https://thehackernews.com/2022/09/how-to-do-malware-analysis.html

 

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:47 am, Juli 8, 2025
Wetter-Symbol 18°C
L: 16° | H: 19°
klarer Himmel
Luftfeuchtigkeit: 55 %
Druck: 1017 mb
Wind: 5 mph ENE
Windböe: 12 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:53 am
Sonnenuntergang: 9:17 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
16° | 19°°C 0 mm 0% 8 mph 56 % 1019 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
15° | 26°°C 0.1 mm 10% 8 mph 59 % 1023 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 7 mph 75 % 1024 mb 0 mm/h
Fr. Juli 11 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 9 mph 68 % 1023 mb 0 mm/h
Sa. Juli 12 10:00 pm
Wetter-Symbol
18° | 28°°C 0 mm 0% 11 mph 71 % 1020 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 8 mph 56 % 1017 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 22°°C 0 mm 0% 8 mph 50 % 1017 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
23° | 25°°C 0 mm 0% 7 mph 37 % 1017 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 7 mph 28 % 1017 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 40 % 1019 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 5 mph 50 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 4 mph 59 % 1021 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 5 mph 53 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,350.69
-0.53%
Ethereum(ETH)
€2,173.97
-1.01%
Fesseln(USDT)
€0.85
-0.01%
XRP(XRP)
€1.94
0.31%
Solana(SOL)
€127.81
-1.71%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.144001
-2.09%
Shiba Inu(SHIB)
€0.000010
-0.27%
Pepe(PEPE)
€0.000009
-2.12%
Nach oben scrollen