O'Reilly logo

Malware Forensics Field Guide for Windows Systems by James M. Aquilina, Eoghan Casey, Cameron H. Malin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Analysis of a Malware Specimen

Solutions in this chapter:

• Goals

• Guidelines for Examining a Malicious File Specimen

• Establishing the Environment Baseline

• Pre-execution Preparation: System and Network Monitoring

• Execution Artifact Capture: Digital Impression and Trace Evidence

• Executing the Malware Specimen

• Execution Trajectory Analysis: Observing Network, Process, API, File System, and Registry Activity

• Automated Malware Analysis Frameworks

• Online Malware Analysis Sandboxes

• Defeating Obfuscation

• Embedded Artifacts Revisited

• Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Specimen Functionality and Purpose

• Event Reconstruction and Artifact Review: Post-run Data Analysis

• Digital ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required