Static Analysis
Dynamic Analysis
Pot Pourri
Malware
Persistence
100

The process of examining malware without executing it.

What is static analysis?

100

Running malware in a controlled environment to observe its behavior.

What is dynamic analysis?

100

A very common method of obfuscation used by malware authors to hide strings within their code.

What is base64 encoding?

100

This type of malware encrypts files and demands payment to unlock them.

What is ransomware?

100

This allows malware to survive reboots and remain active on a system.

What is persistence?

200

MD5, SHA-1, and SHA-256 are examples of these, used to identify files by generating unique values.

What are hash algorithms?

200

A tool used to identify programs configured to run automatically at startup, which can reveal persistence.

What is Autoruns?

200

A tool used to obtain strings from malware samples that also de-obfuscates extracted strings. Or a funny dance move.

What is FLOSS?

200

This type of malware disguises itself as legitimate software to trick users.

What is a Trojan?

200

A common registry key that malware modifies to achieve persistence.

What is HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run?

300

A tool used in static analysis to inspect the structure of Portable Executable (PE) files.

What is PE Studio?

300

Isolating malware in this environment is essential to prevent it from affecting other systems.

What is a sandbox?

300

The file signature for an executable file.

What is 4D 5A or MZ?

300

A self-replicating malware that spreads across networks without user interaction.

What is a worm?

300

Malware can use this Windows feature to schedule tasks that automatically execute at set times.

What is the Task Scheduler?

400

Extracting these can reveal hard-coded URLs, IPs, or other readable text within malware.

What are strings?

400

The strings found from malware samples such as URLs, IP addresses, C2 Server names, filenames, paths, and functions are called these which we can send to the SOC to look for other instances of the malware across the organization.

What are Indicators of Compromise?

400

These contain functions that the malware can use to interact with the Windows Operating System.

What are libraries?

400

Specialized malware used to hide the presence of other malicious files on a system.

What is a rootkit?

400

Installing itself as one of these allows malware to start automatically at boot and is a stealthy way to achieve persistence.

What is a Windows service?

500

Renaming or modifying a malware file to prevent accidental execution.

What is defanging?

500

This feature in virtual machines allows analysts to save the current state, making it easy to revert back after running malware.

What is a snapshot?

500

Malware creates this to ensure only one copy of itself can run at a time.

What is a Mutex?

500

Malware designed to secretly gather information on a user or organization.

What is spyware?

500

Placing malware here ensures it runs automatically when the user logs in.

What is the startup folder?

M
e
n
u