Stages of Malware Analysis

Dolyetyus

Co Admin
21 Nis 2020
1,207
668
Delft
Welcome TurkHackTeam Members, in this article I wrote about Stages of Malware Analysis. This topic won't take so long.

There are already a few articles about this topic, however I will give some different information.

malware-analysis-process-stages.png


First one is: Static Properties Analysis

Static properties include strings embedded in the malware code, header details, hashes, métadata, embedded resources, et cetera. This type of data may be all that is needed to create IOCs, and they can be acquired very quickly because there is no need to run the program in order to see them. This one is the easiest way. However you cannot understand all suspicious softwares whether it is a malware or not. Insights gathered during the static properties analysis can indicate whether a deeper investigation using more comprehensive techniques is necessary and determine which steps should be taken next.

Second: Interactive Behavior Analysis


Behavioral analysis is used to observe and interact with a malware sample running in a lab. Analysts seek to understand the sample’s registry, file system, process and network activities. They may also conduct memory forensics to learn how the malware uses memory. This method is mostly used while scanning on sandboxes. If the analysts suspect that the malware has a certain capability, they can set up a simulation to test their theory.

analysis-stages.svg


Third: Fully Automated Analysis

Fully automated analysis quickly and simply assesses suspicious files. The analysis can determine potential repercussions if the malware were to infiltrate the network and then produce an easy-to-read report that provides fast answers for security teams. So as you can see, this one is a bit more complicated. Fully automated analysis is the best way to process malware at scale.

Last one: Manual Code Reversing

In this stage, analysts reverse-engineer code using debuggers, disassemblers, compilers and specialized tools to decode encrypted data, determine the logic behind the malware algorithm and understand any hidden capabilities that the malware has not yet exhibited. Code reversing is a rare skill, and executing code reversals takes a great deal of time. For these reasons, malware investigations often skip this step and therefore miss out on a lot of valuable insights into the nature of the malware. You need to be cracker, a reverse engineering expert. This one is the most complicated and long one.

Thanks for reading. Have a nice day.
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.