N .Whitepaper
N .Whitepaper
to malware
analysis
02
Table of contents
04 Sandboxes
05 Interactive sandbox
06 Malware Detection
19 Final words
03
Today, most malware samples are polymorphic. This means that they are
equipped with a mutation engine that can change certain parameters like
file names and hash sums, completely throwing off antiviruses. Emotet
Trojan and Qbot are examples of widely known malware families that use
polymorphism.
04
Sandboxes
A sandbox is a tool for executing suspicious programs from untrusted
sources in a safe environment for the host machine. There are different
approaches to the analysis in sandboxes. They can be automated or
interactive.
Moreover, changing settings to every file takes a lot of time and anyway,
you can’t affect it directly. We should keep in mind that analysis doesn’t
always follow the line and things may not work out as planned for this very
sample.
Finally, it’s lacking the speed we need, as we have to wait up to half an hour
for the whole cycle of analysis to finish. All of these cons may cause
damage to the security if an unusual sample remains undetected.
Thankfully, now we have interactive sandboxes.
05
Interactive sandbox
ANY.RUN is an interactive malware analysis sandbox. All cybersecurity
specialists can use the platform from students to experts. The service
detects, analyzes, and monitors cybersecurity threats. A user-friendly
interface allows performing effective and qualitative investigations.
ANY.RUN company was founded in 2016. Since that time, it has held a
leading position among platforms that detect malicious programs. 150k
malware analytics work with the service every day. And a lot of users
benefit from the platform’s results of the investigation. Large organizations
from finance, healthcare, trading, and many other sectors use ANY.RUN
and keep their data safe.
The service shows all processes in real-time. And an analyst can notice all
malicious operations before the final version of the report.
Besides that, the community has numerous investigators all over the world
who take part in the threat intelligence platform. ANY.RUN comprises over
2 million public submissions and this vast malware database is updated
daily. Users can collect new samples and IOCs using this database. You
can work individually or in a team. Tasks that you create may be public or
private. The advantage is that you can save your money using ANY.RUN
instead of wasting it on extra equipment and useless tools.
06
Malware Detection
Before analyzing malware or dealing with the consequences of an attack
the analyst needs to detect the threat. Unfortunately, with modern malware
using so many anti-detection techniques, relying on automatic tools is not
enough anymore.
07
Interactivity
Throws-Off Malware
Evasion Techniques
Interactive analysis is becoming more popular every day. It can be used
both for the analysis of regular samples and is also not replaceable if you
come across unique malware samples. Let’s explore what interactive
analysis is, and what are the main benefits.
With all of the above, the simulation can be corrected when a researcher
notices that something strange is going.
08
Interactive malware
analysis
The goal of malware analysis is to research a malicious sample: its
functions, origin, and possible effects on the infected system. This
data allows analysts to detect malware, react to the attack effectively,
and enhance security.
09
Benefits of
interactive malware
analysis
Interactive analysis has several other
advantages:
Furthermore, there are situations where other analysis types just aren’t
even then other analysis types would take way too long in comparison.
For instance, some malware samples will only execute if certain conditions
are met.
particular online banking website. Only then the trojan will try to steal and
Additionally, some malware has kill switches in a form of files with specific
names or registry keys. Analysts can try to include them in a virtual
machine during analysis or check the language of the malicious document
during analysis, change the system locale, and re-run tasks. This will allow
the malware to work in full and give more IOCs.
Fully automated analysis programs may not know all execution scenarios.
So they miss important steps and don’t paint the whole picture.
11
The downloaded executable file adds itself to the OS startup folder and
stops its execution. This simple trick is heavily used and works just fine.
In addition, the malware adds itself, not directly, but through a text file in
12
In the figure below, we can see that in the initial system that runs all
processes’ activities stopped, after the y6s2gl.exe process is added into
Phishing case
Phishing’s goal is to get access to confidential data, such as personal
information, logins, passwords, etc. It is often manifested as an email on
behalf of different services with links to fake sites. If you follow one of them,
you can see a graphical image of an original site. Pay attention to domain
names or IP addresses, you may find spelling mistakes, it is a distinguishing
feature of a scam.
If you think you’re dealing with an untrusted file or a link, the safe solution
can be in malware sandboxes. Analysts run a file or link in a virtual
environment and then watch it in action: what the suspicious file is going
The sandbox can work with various operating systems and browsers.
Sometimes phishing decoys look different in other browsers. With our
service, you can execute analysis with a broad range of opportunities.
In the task with suspicious content, ANY.RUN opens a link and sees where
it follows, what files are downloaded.
First, you insert your login and password, then you are directed to the
original site. But all your data is already stolen.
The “Network” stream and “Connections” section gives you details about
where traffic has gone and what URL was opened. ANY.RUN intercepts the
packages with the stolen login and password.
15
Here is a task with fast detection and analysis. The Excel document from
this sample contains a malicious program. And it takes 28 seconds for
ANY.RUN to detect a Formbook.
16
Even by looking at the process tree, you can say that Formbook is in front
of you without waiting for tags. Malicious payload injects itself in system
processes from the hardcoded list and then spawns the child cmd.exe
After that trojan injects into the Explorer.exe process and starts its
but it is also often detected by created files. And it’s helpful that the whole
Platform
for Education
ANY.RUN is a service for deep malware analysis, besides that, it is an
excellent platform for the education of junior staff. Several training
courses use the service in their programs. It’s a great opportunity to get
relevant and profound knowledge from experienced specialists with
modern tools.
The “Public tasks” window is the place where users share their
investigations. It helps to research samples and collect IOCs. A detailed
report will help you find the necessary information quickly and export it.
18
Final words
Malware is becoming more and more sophisticated and, unfortunately,
brand new samples are regularly introduced into the wild. Online security
and solid defense against cyber threats are more important today than it
ever was.