Malware analysis

Last updated

Malware analysis is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit, or backdoor. [1] Malware or malicious software is any computer software intended to harm the host operating system or to steal sensitive data from users, organizations or companies. Malware may include software that gathers user information without permission. [2]

Contents

Use cases

There are three typical use cases that drive the need for malware analysis:

Types

The method by which malware analysis is performed typically falls under one of two types:

Stages

Examining malicious software involves several stages, including, but not limited to the following:

Standardized evaluation of sandbox-based analysis products has also emerged. In 2025, the Anti-Malware Testing Standards Organization (AMTSO) introduced the first Sandbox Evaluation Framework, aimed at providing consistent, use-case-driven testing criteria for sandbox malware analysis tools. [8] [9] [10]

Artificial Intelligence vs. Humans

The use of artificial intelligence (AI) in malware detection has been an active area of research within the field of cybersecurity. One study compared the behavior of AI against human behavior to understand the similarities and differences in how these two parties performed. [11] The results included:

Antivirus softwares have used these studies to come to a conclusion that a combination of both practices would be most ideal. Since AI can use static analysis at a much faster rate than humans in malware detection, the antivirus software will send the samples to the AI for an initial screening. If the sample is more complex and the AI cannot make a definitive conclusion, then the sample will be sent to a human to observe the sample in more detail. In this way, more samples can be correctly identified as malware or benign.


References

  1. "International Journal of Advanced Research in Malware Analysis" (PDF). ijarcsse. Archived from the original (PDF) on 2016-04-18. Retrieved 2016-05-30.
  2. "Malware Definition". Archived from the original on 2016-06-10. Retrieved 2016-05-30.
  3. Honig, Andrew; Sikorski, Michael (February 2012). Practical Malware Analysis. No Starch Press. ISBN   9781593272906 . Retrieved 5 July 2016.
  4. Keragala, Dilshan (January 2016). "Detecting Malware and Sandbox Evasion Techniques". SANS Institute.
  5. Miller, Jan (June 2013). "Hybrid Code Analysis versus State of the Art Android Backdoors" (PDF). Hakin9. 8 (6). Retrieved 1 September 2025.
  6. Kevin Townsend (November 21, 2017). "CrowdStrike Adds Malware Search Engine with Hybrid Analysis Acquisition". SecurityWeek. Retrieved 1 September 2025.
  7. "A Look at the Hybrid Analysis Malware Sandbox by Jan Miller". Lenny Zeltser. Retrieved 1 September 2025.
  8. "AMTSO Releases Sandbox Evaluation Framework". SecurityWeek. March 26, 2025. Retrieved 1 September 2025.
  9. Arielle Waldman (March 26, 2025). "New Testing Framework Helps Evaluate Sandboxes". Dark Reading. Retrieved 1 September 2025.
  10. "Rethinking sandbox testing with a modern framework". Okoone. April 7, 2025. Retrieved 1 September 2025.
  11. Aonzo, Simone; Han, Yufei; Mantovani, Alessandro; Balzarotti, Davide (August 9, 2023). Humans vs. Machines in Malware Classification. Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23). Anaheim, CA: USENIX Association. Retrieved 17 November 2025.