Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Static analysis extracts indicators from the malicious code of the binary files. However due to obfuscation and packing techniques, it is often difficult to detect
Static analysis extracts indicators from the malicious code of the binary files. However due to obfuscation and packing techniques, it is often difficult to detect malware only by static analysis. For packed malware, a selfmodifying unpacking program unpack the malicious PE and then it is loaded into memory for execution. When malware is executed in a sandbox, runtime behaviour of malware can be extracted including creations of files and folders, functions and library calls, modification in the registries, addition of new services, creation and modification of processes, process injections, modifications in the stratup programs, and installations of new applications. Attackers try to leave as less traces as possible in the file system or disk. So memory forensic is becoming a critical tool to extract the runtime behaviour of malware and detect the malware.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started