Loopus

Pro Content

This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.

Incident Response & ForensicsMalware Analysis Basics

Dynamic Analysis

40 min
lab
+70 XP

Learning Objectives

  • Perform static malware analysis
  • Extract indicators from malware samples
  • Document analysis findings

Static Malware Analysis

Static analysis examines malware without execution. Safe and fast, static analysis reveals structure, indicators, and sometimes functionality.

File Identification

File hashes - Calculate MD5, SHA1, SHA256 for identification.

  • Check VirusTotal and other databases

  • Enable detection across the environment


File type confirmation - Extension does not equal type. Use file signature identification.

Packing detection - Packed files require unpacking before analysis. Tools like Detect It Easy identify common packers.

String Extraction

Strings reveal malware intent:

  • URLs and IP addresses

  • Domain names

  • Registry keys

  • File paths

  • Error messages

  • Command structures


strings malware.exe | more

Encoded or packed malware hides strings. Unpack or analyze dynamically if static extraction yields little.

PE Analysis

For Windows executables:

Headers - Compilation timestamp, sections, characteristics.

Imports - What functions does it use?

  • Network functions suggest C2 capability

  • Registry functions suggest persistence

  • Crypto functions suggest encryption

  • Process functions suggest injection


Exports - What does it offer to other programs?

Resources - Embedded files, icons, version information.

Tools: PE Studio, CFF Explorer, pestudio

Document Analysis

Office documents require different approaches:

Embedded macros - Extract and analyze VBA code.

OLE streams - Look for embedded executables or scripts.

DDE links - May execute commands without macros.

Tools: oletools, oledump.py

Indicator Extraction

Document findings for detection:

  • File hashes

  • Network indicators (IPs, domains, URLs)

  • Registry paths for persistence

  • Mutex names for deduplication

  • File paths for staging


Format indicators for consumption by security tools. Share with threat intelligence platforms.

Documentation

Record analysis process:

  • Sample identification (hashes)

  • Analysis techniques used

  • Findings with evidence

  • Extracted indicators

  • Assessment of threat

Answer the Questions0 / 4 completed

📚 KnowledgeQuestion 1

What is dynamic malware analysis?

Format: *******(7 chars)
Exact match required
⌨️ Hands-OnQuestion 2

What safe environment is used for analysis?

Format: *******(7 chars)
Exact match required
📚 KnowledgeQuestion 3

What behaviors indicate malware?

Format: *********(9 chars)
Exact match required
⌨️ Hands-OnQuestion 4

What term describes reaching out to C2?

Format: ********(8 chars)
Exact match required
Answer all questions correctly to unlock the next lesson

Interactive Sandbox

Loading sandbox...

Submit Flag

Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}

Previous
Answer all questions to continue