0
0
Cybersecurityknowledge~10 mins

Malware analysis basics in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Malware analysis basics
Receive Suspicious File
Static Analysis
Dynamic Analysis
Behavior Observation
Report Findings
Mitigation
Malware analysis starts by getting the suspicious file, then checking it without running it (static), then running it safely (dynamic), watching what it does, and finally reporting and stopping it.
Execution Sample
Cybersecurity
1. Get suspicious file
2. Check file info (size, type)
3. Scan file with antivirus
4. Run file in safe environment
5. Watch file actions
6. Write report
This sequence shows the basic steps to analyze malware from receiving to reporting.
Analysis Table
StepActionWhat HappensResult
1Receive Suspicious FileFile is obtained for analysisFile ready for checking
2Static AnalysisCheck file properties without runningIdentify file type, hashes, strings
3Scan with AntivirusRun antivirus scan on fileDetect known malware signatures or none
4Dynamic AnalysisRun file in isolated environmentObserve real-time behavior safely
5Behavior ObservationMonitor file actions (network, files)Record suspicious activities
6Report FindingsSummarize analysis resultsCreate report for response team
7MitigationApply fixes or blocks based on reportPrevent malware spread or damage
💡 Analysis ends after reporting and mitigation steps to protect systems.
State Tracker
VariableStartAfter Step 2After Step 4After Step 6Final
File StatusSuspiciousAnalyzed staticallyAnalyzed dynamicallyBehavior recordedMitigated or flagged
Threat LevelUnknownPotential riskConfirmed behaviorAssessed riskResolved or monitored
Key Insights - 3 Insights
Why do we do static analysis before running the file?
Static analysis (Step 2) helps understand the file safely without risk. It shows file info and possible threats before running it in Step 4.
What is the purpose of running the file in a safe environment?
Dynamic analysis (Step 4) lets us see what the file actually does without risking the real system, as shown in the execution table.
How does behavior observation help in malware analysis?
Observing behavior (Step 5) reveals actions like network calls or file changes, which static checks might miss, helping assess threat level.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution table, what is the result after Step 3?
AKnown malware signatures detected or none
BFile is run in a safe environment
CFile type and hashes identified
DReport created for response team
💡 Hint
Check the 'Result' column for Step 3 in the execution table.
At which step does the file behavior get recorded?
AStep 2 - Static Analysis
BStep 5 - Behavior Observation
CStep 4 - Dynamic Analysis
DStep 6 - Report Findings
💡 Hint
Look at the 'Action' and 'What Happens' columns in the execution table.
If the file is found safe during static analysis, what happens next?
AImmediately apply mitigation
BSkip dynamic analysis and report safe
CProceed to dynamic analysis to confirm behavior
DDelete the file without further checks
💡 Hint
Refer to the logical flow in concept_flow and the execution steps.
Concept Snapshot
Malware analysis basics:
1. Receive suspicious file
2. Static analysis: check file info safely
3. Dynamic analysis: run in isolated environment
4. Observe behavior: monitor actions
5. Report findings
6. Apply mitigation to protect systems
Full Transcript
Malware analysis starts by receiving a suspicious file. First, static analysis checks the file's properties without running it to avoid risk. Then, dynamic analysis runs the file in a safe, isolated environment to observe its real behavior. Behavior observation records actions like network connections or file changes. Finally, analysts write a report and apply mitigation steps to protect systems from harm. This step-by-step process helps safely understand and stop malware threats.