{"id":5783,"date":"2023-09-19T08:02:46","date_gmt":"2023-09-19T08:02:46","guid":{"rendered":"\/cybersecurity-blog\/?p=5783"},"modified":"2024-06-03T10:21:18","modified_gmt":"2024-06-03T10:21:18","slug":"malware-analysis-anyrun-tips","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/","title":{"rendered":"Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN\u00a0"},"content":{"rendered":"\n<p>At <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ouranalysisapproach&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, the value of our product lies in its detection and analysis capabilities. Our service needs to be able to identify a threat as soon as it exhibits malicious activity. This is why we have a large team dedicated solely to discovering, analyzing, and reverse engineering new families of malware to extract the information needed to keep our system up-to-date.<\/p>\n\n\n\n<p>In this article, we want to offer you a behind-the-scenes look at our malware analysis department, showing their complete course of action when handling a fresh sample of malicious software and know-hows they use during every stage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 1: Finding a new sample<\/h2>\n\n\n\n<p>Our team is constantly on the lookout for fresh <a href=\"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware samples<\/a>. In this regard, our <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=ouranalysisapproach23&amp;amp%3Butm_content=submissions\" target=\"_blank\" rel=\"noreferrer noopener\">public database<\/a> of submissions, which receives an inflow of thousands of daily uploads, serves as the core source for finding yet-unseen material. &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"470\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-1024x470.png\" alt=\"\" class=\"wp-image-5785\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-1024x470.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-300x138.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-768x352.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-370x170.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-270x124.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6-740x339.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-6.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s public database contains 6 million submissions<\/em><\/figcaption><\/figure>\n\n\n\n<p>Additionally, we hunt using OSINT sources and other popular platforms, including MalwareBazaar, from which we collect malicious files and links. Once we locate an object of interest, we make sure to gather as many samples of it as possible in order to examine every current variation of the malware and use the information gathered to update our service\u2019s detection capabilities.&nbsp;<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>ANY.RUN, MalwareBazaar, VirusShare.com, Virus.exchange.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 2: Classifying the malware<\/h2>\n\n\n\n<p>In this stage, we focus on identifying the malware&#8217;s type, purpose, and origin. The <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-use-interactivity-in-a-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactivity<\/a> offered by ANY.RUN lets us take a close look at any malware\u2019s behavior and gain a clear insight into the intention behind the malicious program and understand what steps we need to take next.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For instance, ANY.RUN highlights the entire execution path and network traffic of any sample. As a result, we can observe the actions undertaken by the malware and easily spot its primary type, whether it is ransomware that is encrypting files on the system or a stealer that is collecting user data and sending it to its command-and-control server.&nbsp;<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>ANY.RUN.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN community experts: Germ\u00e1n Fern\u00e1ndez, <a href=\"https:\/\/twitter.com\/1ZRR4H\" target=\"_blank\" rel=\"noreferrer noopener\">twitter.com\/1ZRR4H<\/a>&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>The first thing I do is OSINT\/CSINT on the relevant elements of the sample, such as certain strings, communications, infection chain, IPs, domains, or certificates. Then, depending on the type of threat, I analyze it in sandboxes that allow me to simulate or fake an Internet connection to avoid alerting the attackers. If I do not get a positive response, I move to the analysis in my virtual machines until I piece the puzzle together. That is the path I usually follow to find out what it is.<\/em><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 3: Identifying the sample\u2019s format, language, and packer&nbsp;<\/h2>\n\n\n\n<p>It is no surprise that attackers often attempt to disguise the malicious file\u2019s format by replacing its extension with a different one. Therefore, in order to ascertain the sample\u2019s format, we employ the \u201cfile\u201d utility or utilize <strong>Detect It Easy (DIE)<\/strong>. &nbsp;<\/p>\n\n\n\n<p>DIE is a nifty tool that additionally helps us determine the programming language, in which the binary is written, as well as the packer used for encrypting the sample.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"974\" height=\"354\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5.png\" alt=\"\" class=\"wp-image-5784\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5.png 974w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5-300x109.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5-768x279.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5-370x134.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5-270x98.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-5-740x269.png 740w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/any.run\/cybersecurity-blog\/xworm-technical-analysis-of-a-new-malware-version\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>An XWorm sample<\/em><\/a><em> loaded into DIE<\/em><\/figcaption><\/figure>\n\n\n\n<p><strong>Tools used: <\/strong>\u201cFile,\u201d Detect It Easy.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 4: Unpacking the sample&nbsp;<\/h2>\n\n\n\n<p>With the basic information in our pocket, we move on to unpacking. These days, malware developers implement a variety of ways to make it harder for cybersecurity professionals to conduct analysis. Packing is one of them. &nbsp;<\/p>\n\n\n\n<p>To remove protective layers, we use a combination of different tools, including <strong>a debugger and Process Hacker 2, ProcDump, or Volatility <\/strong>launched in a virtualized environment, which allows us to make a proper memory dump suitable for further investigation.&nbsp;<\/p>\n\n\n\n<p>It is worth noting that the entire process which will be outlined below can be carried out much faster using ANY.RUN. Our service provides a detailed execution path and documents every event happening on the system, which is related to malware\u2019s activity, including in terms of the network traffic. The sandbox also makes it possible to download memory dumps of detected malware for closer inspection.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTest the <span class=\"highlight\">interactivity and speed<\/span> of ANY.RUN using your malware sample&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\" rel=\"noopener\" target=\"_blank\">\nGet started with a free account\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Now, to accomplish unpacking, we deploy a controlled virtualized environment using ANY.RUN and software like VirtualBox for running the malware without risking damage to our physical system or network.&nbsp;<\/p>\n\n\n\n<p>Once the virtualized environment is set up, we launch <strong>Process Hacker,<\/strong> a powerful tool for monitoring and analyzing system processes. This tool allows us to closely examine the behavior of the malware as it executes, identifying any unusual or malicious activity. &nbsp;<\/p>\n\n\n\n<p>Simultaneously, we can introduce a <strong>debugger<\/strong>, especially in case of issues with Process Hacker. Our team primarily uses x64dbg. The process of debugging involves setting breakpoints at critical spots in the code to track the program\u2019s logic and identify the moments when it exposes its crucial elements (e.g., IP addresses). Additionally, we utilize Sysinternals utilities, such as Process Monitor, and a number of other solutions, intended for specific tasks.&nbsp;<\/p>\n\n\n\n<p>Using Process Hacker, we can create a memory dump, a snapshot of the contents of a process\u2019 memory at a specific point in time, when the code of the malware gets unpacked and exposed. &nbsp;<\/p>\n\n\n\n<p><strong>To use Process Hacker to create a memory dump: <\/strong>&nbsp;<\/p>\n\n\n\n<p>1. Identify the process associated with the malware. &nbsp;<\/p>\n\n\n\n<p>2. Capture the memory dump &nbsp;<\/p>\n\n\n\n<p>3. Download it to access the unpacked binary&nbsp;<\/p>\n\n\n\n<p>The unpacked binary is the file that contains the actual code of the malware, which is also often heavily encrypted and obfuscated.&nbsp;<\/p>\n\n\n\n<p>As for traffic analysis, we occasionally use <strong>Wireshark<\/strong>, which is the most powerful tool in this regard. Yet, for the majority of tasks, ANY.RUN remains our go-to option since it allows us to study network activity in a much more convenient way. &nbsp;<\/p>\n\n\n\n<p>ANY.RUN also lets you download PCAP files and SSL keys for further analysis in Wireshark. This is especially useful when your current sample has a dead C2 connection, as you can always find previous reports in <a href=\"https:\/\/app.any.run\/submissions\" target=\"_blank\" rel=\"noreferrer noopener\">the public database<\/a> that contain a PCAP file from when the C2 was still active.&nbsp;<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>ANY.RUN, x64dbg, Hacker 2, ProcDump, Volatility, Wireshark, Process Monitor and other Sysinternals utilities, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 5: Extracting strings&nbsp;<\/h2>\n\n\n\n<p>After unpacking the file, we can gain an initial look at its code by extracting the strings it contains. In rare instances when we come across relatively unsophisticated samples, already at this point we can access their data, such as: &nbsp;<\/p>\n\n\n\n<p>&#8211;&nbsp;filenames&nbsp;<\/p>\n\n\n\n<p>&#8211; domain names&nbsp;<\/p>\n\n\n\n<p>&#8211; IP addresses&nbsp;<\/p>\n\n\n\n<p>Yet, most of the time, string extraction yields&nbsp;only&nbsp;API calls, that reveal the functionality and compiler version of the malware. The operation is performed using the standard &#8220;Strings&#8221; command-line utility or other similar tools.&nbsp;<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>\u201cStrings.\u201d&nbsp;<\/p>\n\n\n\n<p>ANY.RUN community experts: James, <a href=\"https:\/\/twitter.com\/James_inthe_box\" target=\"_blank\" rel=\"noreferrer noopener\">twitter.com\/James_inthe_box<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>[During the] first step, [I] submit the sample to almost all free sandboxes. While those are processing, using the FLARE Obfuscated String Solver, I will string the file for any quick wins to identify what the malware is, what it does, or what it is named (rare, but sometimes a sample will come unpacked). If the automated sandboxes are unable to determine what the malware is\/does, then it&#8217;s time for manually running it in ANY.RUN, usually Windows 7 64-bit to start.<\/em><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 6: Disassembly&nbsp;<\/h2>\n\n\n\n<p>Once a memory dump is obtained from the system, it can be analyzed using a disassembler, such as <strong>Ghidra, Radare2, and HxD<\/strong> (a hex editor, which we use in other stages as well). These tools are used to disassemble and analyze the code and data stored in the memory dump. With Ghidra\u2019s advanced features such as cross-references, function call graphs, and code coverage analysis, we can more easily reverse engineer the malware&#8217;s functionality.&nbsp;<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>Ghidra, Radare2, HxD.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stage 7: Extracting configuration&nbsp;<\/h2>\n\n\n\n<p>Once we finish the analysis, we write a config extractor, a script designed to fetch malware\u2019s configuration files that define various parameters, such as command and control (C2) server addresses, encryption keys, and other settings that the program needs to operate.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"978\" height=\"658\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7.png\" alt=\"\" class=\"wp-image-5788\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7.png 978w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7-300x202.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7-768x517.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7-370x249.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7-270x182.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/image-7-740x498.png 740w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN provides complete configs of numerous malware families<\/em><\/figcaption><\/figure>\n\n\n\n<p>Additionally, we create YARA and Suricata rules and use this information to update ANY.RUN, letting users access all the details they need in seconds.<\/p>\n\n\n\n<p><strong>Tools used: <\/strong>Python 3, C#, and libraries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Malware analysis is indispensable in ensuring an organization&#8217;s cybersecurity. However, the process can be time-consuming and complicated. ANY.RUN provides a solution to largely automate it. With a dedicated team constantly analyzing the latest threats and expanding the service\u2019s capabilities, ANY.RUN offers up-to-date information, including IOCs and configurations, to help organizations better protect themselves.&nbsp;<\/p>\n\n\n\n<p>Our team is committed to continuous improvement and values the opportunity to learn from others. This is why we invite you to join our <a href=\"https:\/\/discord.com\/invite\/Ve3cGzmtbW\" target=\"_blank\" rel=\"noreferrer noopener\">Discord server<\/a>, a community of passionate cybersecurity professionals, and share your malware analysis methods and best practices. Let&#8217;s strengthen our skills and grow together.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=ouranalysisapproach23&amp;amp%3Butm_content=trial\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At ANY.RUN, the value of our product lies in its detection and analysis capabilities. Our service needs to be able to identify a threat as soon as it exhibits malicious activity. This is why we have a large team dedicated solely to discovering, analyzing, and reverse engineering new families of malware to extract the information [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,58,34],"class_list":["post-5783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-cybersecurity-training","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Analysis for Keeping Up with the Latest Threats<\/title>\n<meta name=\"description\" content=\"Find out how to conduct malware analysis effectively from the team behind ANY.RUN, a leading malware analysis sandbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stas Gaivoronskii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\"},\"author\":{\"name\":\"Stas Gaivoronskii\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN\u00a0\",\"datePublished\":\"2023-09-19T08:02:46+00:00\",\"dateModified\":\"2024-06-03T10:21:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\"},\"wordCount\":1551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"cybersecurity training\",\"malware analysis\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\",\"name\":\"Malware Analysis for Keeping Up with the Latest Threats\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-09-19T08:02:46+00:00\",\"dateModified\":\"2024-06-03T10:21:18+00:00\",\"description\":\"Find out how to conduct malware analysis effectively from the team behind ANY.RUN, a leading malware analysis sandbox.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Stas Gaivoronskii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/Stasphoto.png\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/Stasphoto.png\",\"caption\":\"Stas Gaivoronskii\"},\"description\":\"Stas is a malware analyst at ANY.RUN. He has more than 11 years of experience in the digital forensics field and 4 years in malware analysis.\u00a0\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Analysis for Keeping Up with the Latest Threats","description":"Find out how to conduct malware analysis effectively from the team behind ANY.RUN, a leading malware analysis sandbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/","twitter_misc":{"Written by":"Stas Gaivoronskii","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/"},"author":{"name":"Stas Gaivoronskii","@id":"https:\/\/any.run\/"},"headline":"Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN\u00a0","datePublished":"2023-09-19T08:02:46+00:00","dateModified":"2024-06-03T10:21:18+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/"},"wordCount":1551,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","cybersecurity training","malware analysis"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/","name":"Malware Analysis for Keeping Up with the Latest Threats","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-09-19T08:02:46+00:00","dateModified":"2024-06-03T10:21:18+00:00","description":"Find out how to conduct malware analysis effectively from the team behind ANY.RUN, a leading malware analysis sandbox.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-anyrun-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Malware Analysis for Keeping Up with the Latest Threats: Lessons from ANY.RUN\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Stas Gaivoronskii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/Stasphoto.png","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/09\/Stasphoto.png","caption":"Stas Gaivoronskii"},"description":"Stas is a malware analyst at ANY.RUN. He has more than 11 years of experience in the digital forensics field and 4 years in malware analysis.\u00a0","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5783"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5783"}],"version-history":[{"count":8,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5783\/revisions"}],"predecessor-version":[{"id":5812,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5783\/revisions\/5812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/5814"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}