Dynamic Analysis
Dynamic analysis involves running the malware in a controlled environment (sandbox) to observe its behavior, network traffic, and system modifications.
Safety First
System Monitoring
Tools to capture file system, registry, and process activity in real-time.
Process Monitor (Procmon)
Filters are key. Filter by "Process Name" is "malware.exe". Look for:
- CreateFile: Dropping new files.
- RegSetValue: Persistence mechanisms (Run keys).
- Process Create: Launching child processes (e.g., cmd.exe, powershell.exe).
Process Hacker / Process Explorer
View running processes, parent-child relationships, loaded DLLs, and memory strings.
Network Monitoring
Malware often beacons to C2 servers or downloads payloads.
Wireshark
Capture all traffic. Look for DNS queries (often the first sign of activity) and HTTP/TCP streams.
INetSim
Simulates common internet services (DNS, HTTP, FTP) so the malware thinks it's online and reveals its network behavior without actually connecting to the internet.
Debugging
Stepping through instructions one by one to analyze specific functions or bypass checks.
x64dbg (x32dbg)
Modern, open-source debugger for Windows.
- Breakpoints: Set breakpoints on interesting API calls (e.g., `bp VirtualAlloc`, `bp CreateProcessW`).
- Memory Map: View memory sections to find unpacked code.