{"id":1650,"date":"2021-07-15T05:51:34","date_gmt":"2021-07-15T05:51:34","guid":{"rendered":"\/cybersecurity-blog\/?p=1650"},"modified":"2026-02-10T13:46:04","modified_gmt":"2026-02-10T13:46:04","slug":"introduction-to-malware-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/","title":{"rendered":"Introduction to Malware Analysis"},"content":{"rendered":"\n<p>When analyzing malware, it is often necessary to go beyond static analysis techniques and use dynamic analysis. This way helps to understand the malware&#8217;s functionality better and find more IOCs, which is often our end goal.&nbsp;<br><\/p>\n\n\n\n<p>Using a sandbox can automate the dynamic analysis process for you, saving you the time of having to do the process manually. Let&#8217;s take a look at two different samples using the sandbox from <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=guest_post&amp;utm_content=introduction_malware_analysis\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>, and some of the features this service provides. The focus will be on dynamic analysis, mainly through the network traffic generated by the document. ANY.RUN uses Suricata for its threat detection and will provide the alerts that result from said network traffic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IcedID malware analysis<\/strong><\/h2>\n\n\n\n<p>During the execution of a task ANY.RUN provides <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">interactive access <\/a>to the virtual machine. And when the task has been completed, either screenshots or videos are available. So you can view what is happening when the malware becomes active.<br><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/e65f0c6d-3754-4a30-a09f-e2ecfbfaeaae\/\" target=\"_blank\">The first sample<\/a> comes from a malicious Office Excel document. In this case, we just see an Excel opening and a prompt to enable editing and content, typical of malicious Office documents. One sign of possible malicious content is poor grammar and spelling mistakes, and here we see that button is misspelled as \u201cbytton.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/07\/imgonline-com-ua-AutoEnrich-KW5AcPq4c2Zu-1-1024x578.jpg\" alt=\" Misspelling of \u201cbyttun\u201d inside of Excel document\" class=\"wp-image-1699\" style=\"width:856px;height:482px\"\/><\/figure>\n\n\n\n<p>The panel on the right side displays a process tree, beginning with the initial process and continuing with all further spawned processes to get an overview of what is happening. In this example, Excel spawns three Rundll32.exe processes, which can be seen in the picture below.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/gAkwmhrsj7hiER7IxtpGU8jFTSLbsDRlH3k0lEbsE2oLPmlZAyfrIHgUOdqoRf0piUPem6u7SqEH2kfQS2oHGV-ta9EwmB6zqF3ZbVIegb5dYUoHFrE1wWwBclbMADNwmPC43qQ\" alt=\"Process tree for Excel document\" style=\"width:924px;height:275px\"\/><\/figure><\/div>\n\n\n<p>The bottom panel has network information such as HTTP Requests, Connections, DNS Requests, and Threats (IDS alerts). A great feature of ANY.RUN is that network activity is displayed in real-time. You don\u2019t have to wait for malware to finish detonation and a final summary report to be created to begin to see IOCs and other helpful information.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Ysa6oYh5ZYBF4KtvdzMshxOJfUBd8hJHXXYWTnPyncXx35bQvp2Q3WA8EuPLNt_Y2WEiKMS0vRWt2mqV8s1kSSjQp0ZuJObmXlyDm6CcE25YKemTYsUIubwdF63c-3y23T_KIpI\" alt=\"Networking information panel\"\/><\/figure>\n\n\n\n<p>One important IOC is URLs that the malware is attempting to connect to. Under the <em>HTTP Request <\/em>tab, we can see to whom requests are being made, the location of the address, and the process name and ID. We can see that Excel is making multiple requests for executable files, which is suspicious. The requests are also going to dotted-quad IP addresses instead of a typical web address, like www.google.com, which is uncommon. You can click on the \u201cexecutable\u201d cell under the Content tab to see the actual request and response data.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/vhstkc3qfA_yyHX4jtaBdY774kGjXzb_b-7PrSCwHIe_qhypa082yJXj0ELWaVn0TBJW54XCEm1Tfu7APo85X9kwcfMdPEkIwxCag1WAzyu3WGg2pp7y3sySXH13rKLA62Teync\" alt=\"Response data from the HTTP request\"\/><\/figure>\n\n\n\n<p>You can see summary data as well as hash values. Under the data section, you can clearly see the \u201cmagic number\u201d MZ, which indicates that this is a PE file. Looking back at the requests, the newly created processes try to request additional files from hxxp:\/\/630mordorebiter[.]website\/, which were not successful in this case but are still recognized as malicious sites. Looking under the Threat tab, you can see all the alerts generated by <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\">Suricata<\/a>.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/iVMVQAnrH_TMPekaAILazHrL-7yMP47brczIIcmgTd0uUFMjPvTH4YYXvilZN4MP74ABjyy2dZNVWNrsizx6Umbh4xzOsjDExF4UeXWXVbPMiYWdqUC-rMYeATvQIQJSSVBgDhE\" alt=\"Suricata alerts from Excel document\" style=\"width:947px;height:182px\"\/><\/figure>\n\n\n\n<p>As we noticed earlier, Excel is downloading a PE file, and the request addresses are dotted quads, both of which were detected by Suricata. Also, the two additional rundll32 processes that were spawned were recognized as malware, specifically, <a href=\"https:\/\/any.run\/malware-trends\/icedid\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">IcedID<\/a>, which were trying to download other content from hxxp:\/\/630mordorebiter[.]website\/. Looking at the DNS request and Connections tab will give you more detailed network information if you desire.<br><\/p>\n\n\n\n<p>In the upper right-hand corner of the website, you will find summary information such as file name, hashes, malware type, and environment run-time. Also, you can download the sample and get a list of all the IOCs in one place, which is convenient. All of these services are free. Some, like sample downloads, require an account, but again, all free.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"519\" height=\"208\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot20210101.png\" alt=\"\" class=\"wp-image-8380\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot20210101.png 519w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot20210101-300x120.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot20210101-370x148.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot20210101-270x108.png 270w\" sizes=\"(max-width: 519px) 100vw, 519px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IOCs<\/strong><br><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2021\/07\/\u0421\u043d\u0438\u043c\u043e\u043a-\u044d\u043a\u0440\u0430\u043d\u0430-2021-07-15-\u0432-09.33.51-1024x773.png\" alt=\"Summary of IOCs\n\" class=\"wp-image-1703\" style=\"width:912px;height:688px\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Dridex malware analysis<\/strong><\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/7dd4537b-eaf3-4b42-b123-a3c5e3d0316d\/\" target=\"_blank\">The next sample <\/a>is another Excel document. It claims to be a \u201creport\u201d but is very small and hard to read, probably done on purpose. Even though a button is intended to incite action from the user, the macros are still executed when the document is opened and content-enabled. These social engineering techniques are used to add more perceived credibility to the document.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"843\" height=\"474\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715.png\" alt=\"\" class=\"wp-image-8381\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715.png 843w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/07\/screenshot715-740x416.png 740w\" sizes=\"(max-width: 843px) 100vw, 843px\" \/><\/figure>\n\n\n\n<p>The process tree shows Excel launches wmic.exe, which in turn launches rundll32, which is used to run fnb5b.dll.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/MbcB5l20S9UeuSOfOaeRFtzCjjhs9A69Y5d1Wr9dovymrEJHMhYwrIEE-s0P49kCRrONWs7V4qxT-EFiNQfzrssRBc3lqN_5HKBQNVSYlFYnT5t_ioMiCQFXJ4tU2c041eNK-A4\" alt=\"Processes spawned from Excel document\"\/><\/figure>\n\n\n\n<p>Under the HTTP Requests tab, we can see that wmic.exe, spawned by the Excel doc, makes a GET request to hxxp:\/\/pbotv[.]tv\/to presumably download a PHP file, which seems suspicious.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/eh2CXclH9iA1vW14RmxAUeCbdZTJci414gy1_vvZLMOlvX-nuiSagONdWIRxYX39bxtGPnlUfxN8O29CoTzHFopyawb_63WHfLVVgnPbSeMGLUzKBq02bgxBUmYK41isN0-12yw\" alt=\"HTTP requests tab\"\/><\/figure>\n\n\n\n<p>To dig a little deeper, we can click the icon under the \u201cContent\u201d tab of the same request and ANY.RUN will provide the contents of the download.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/cvwA-iRJhBZfXDU6K38VVgMVQ3Ig_76NMB8LFnjQoHSxbUEFaZkBgZH3md_s3rowc96RzL0ojYmsObrv4OsUMPD_7RicMDidty_K-z2G2oLlRUxF9Zt35_W02L_UUUv7sEE0TF4\" alt=\"Content of HTTP response\"\/><\/figure>\n\n\n\n<p>As you can see, the file is actually identified as a DOS executable, which we can verify in the hex data with the \u201cmagic\u201d MZ and the \u201cDOS mode\u201d text. This process then uses rundll32 to execute the downloaded PE file, making two more GET requests. You can click directly on the process in the process tree or under the HTTP Request tab to view more details. ANY.RUN supplies a threat score, which is 100\/100 here, and lists specific threats below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/-FVmlUfwsPzl3os6YvZKmivs6LZyWu7Sqpf6UY-khpWTGO8aJryn2s6pRLeC20lv_Mv59Tl_t_KbZjdYGGTka-7-2Ugilyq9DtCkGhSeHRgi5798m9va0OcWTTvfgj2asM2L1Ig\" alt=\"Threat Score of document\"\/><\/figure>\n\n\n\n<p>Lastly, under the Threats tab, we are given the specific alerts that were triggered in Suricata. Here, wmlc.exe downloads a PE file via HTTP Get request. Then rundll32 executes a dll which is explicitly recognized as <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/malware-trends\/dridex\" target=\"_blank\">Dridex malware<\/a>. Again, the Connections and DNS Requests tabs will give more details if desired.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/xbKLGKT82LHCE3gkyzmZUfU3AupRAK-ir0hIBFpsWDOD-1Jdykiin44FpXEw9t9VbsP1SvBXfjxSC8tIqJMrhBxeITbvXSNf2ViMQ_fsF9mGUW5dNgTRSX5IO7Rh-2oCH0iz6-4\" alt=\"Suricata alerts from document\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IOCs<\/strong><\/h2>\n\n\n\n<p>http:\/\/pbotv.tv\/wp-content\/plugins\/sg-cachepress\/vendor\/a5hleyrich\/y8UzX1Zf0ZWtO.php<\/p>\n\n\n\n<p>pbotv.tv<\/p>\n\n\n\n<p>C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\6Z2BCOUL\\y8UzX1Zf0ZWtO[1].php<\/p>\n\n\n\n<p>35.214.243.127<\/p>\n\n\n\n<p>77.220.64.140<\/p>\n\n\n\n<p>8.253.204.120<\/p>\n\n\n\n<p>8.4.9.152&nbsp;<\/p>\n\n\n\n<p>sha256\t &nbsp; 23c625b550dea7fb8847a4c34f931181066e18a97ea40d3018d6a1f77ece9772&nbsp;<\/p>\n\n\n\n<p>sha1&nbsp; &nbsp; &nbsp; &nbsp; d6be6c4b01e1690923b06253783c79ce3b352e14&nbsp;<\/p>\n\n\n\n<p><strong>Sample 1: <\/strong><a href=\"https:\/\/app.any.run\/tasks\/e65f0c6d-3754-4a30-a09f-e2ecfbfaeaae\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/e65f0c6d-3754-4a30-a09f-e2ecfbfaeaae\/<\/a><\/p>\n\n\n\n<p>MD5 4cd507abe0d01f83a133f7bd8e9f8915<br><\/p>\n\n\n\n<p><strong>Sample 2: <\/strong><a href=\"https:\/\/app.any.run\/tasks\/7dd4537b-eaf3-4b42-b123-a3c5e3d0316d\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/7dd4537b-eaf3-4b42-b123-a3c5e3d0316d\/<\/a><\/p>\n\n\n\n<p>MD5 caf32427ed8b4558c25adbf5c3701594<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>In-depth manual malware analysis can be very time-consuming and cumbersome. The use of a feature-rich sandbox, like ANY.RUN can streamline your workflow and make your life much easier. This brief analysis of these two samples only highlights some of the site&#8217;s features and is intended as a starting point for sample analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When analyzing malware, it is often necessary to go beyond static analysis techniques and use dynamic analysis. This way helps to understand the malware&#8217;s functionality better and find more IOCs, which is often our end goal.&nbsp; Using a sandbox can automate the dynamic analysis process for you, saving you the time of having to do [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-1650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-posts","category-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Investigate malicious files with our guest writer. He will lead you through each step of Dridex and IcedID analysis, so you can repeat it by yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Blevins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\"},\"author\":{\"name\":\"Ryan Blevins\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Introduction to Malware Analysis\",\"datePublished\":\"2021-07-15T05:51:34+00:00\",\"dateModified\":\"2026-02-10T13:46:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\"},\"wordCount\":1081,\"commentCount\":41,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"articleSection\":[\"Guest Posts\",\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\",\"name\":\"Introduction to Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-07-15T05:51:34+00:00\",\"dateModified\":\"2026-02-10T13:46:04+00:00\",\"description\":\"Investigate malicious files with our guest writer. He will lead you through each step of Dridex and IcedID analysis, so you can repeat it by yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introduction to Malware Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Ryan Blevins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/RB.png\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/RB.png\",\"caption\":\"Ryan Blevins\"},\"description\":\"My name is Ryan Blevins, and I live in the Pacific North West, where I love spending time out in the wild to recharge myself. I earned a BS in Cyber Operations from Dakota State University. My professional interests include cyber-security, especially reverse engineering and all things malware-related.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog","description":"Investigate malicious files with our guest writer. He will lead you through each step of Dridex and IcedID analysis, so you can repeat it by yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/","twitter_misc":{"Written by":"Ryan Blevins","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/"},"author":{"name":"Ryan Blevins","@id":"https:\/\/any.run\/"},"headline":"Introduction to Malware Analysis","datePublished":"2021-07-15T05:51:34+00:00","dateModified":"2026-02-10T13:46:04+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/"},"wordCount":1081,"commentCount":41,"publisher":{"@id":"https:\/\/any.run\/"},"articleSection":["Guest Posts","Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/","name":"Introduction to Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-07-15T05:51:34+00:00","dateModified":"2026-02-10T13:46:04+00:00","description":"Investigate malicious files with our guest writer. He will lead you through each step of Dridex and IcedID analysis, so you can repeat it by yourself.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Introduction to Malware Analysis"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Ryan Blevins","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/RB.png","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/RB.png","caption":"Ryan Blevins"},"description":"My name is Ryan Blevins, and I live in the Pacific North West, where I love spending time out in the wild to recharge myself. I earned a BS in Cyber Operations from Dakota State University. My professional interests include cyber-security, especially reverse engineering and all things malware-related.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1650"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1650"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":18408,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1650\/revisions\/18408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3766"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}