Basic Dynamic Analysis
Basic Dynamic Analysis
Basic Dynamic Analysis
4. Take your notes, screenshots, and data from the virtual machine and
transfer it to the physical machine.
• It may not record all events, because nor the sandbox would wait long
enough.
• If the malware is set to sleep for a day before it performs malicious activity, you
may miss that event.
• The sandbox environment OS may not be correct target for the malware.
• For example, the malware might crash on Windows XP but run correctly in
Windows 7.
Registry Can tell if and how malware installs itself in the registry
• Now, lets take a look at all the tools discussed so far, as we present a
sample setup for malware analysis.