{"id":9599,"date":"2024-11-02T11:41:05","date_gmt":"2024-11-02T11:41:05","guid":{"rendered":"\/cybersecurity-blog\/?p=9599"},"modified":"2024-11-02T13:35:33","modified_gmt":"2024-11-02T13:35:33","slug":"how-to-analyze-malicious-network-traffic","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/","title":{"rendered":"How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN"},"content":{"rendered":"\n<p>Network traffic analysis provides critical insights into malware and phishing attacks. Doing it effectively requires using proper tools like ANY.RUN&#8217;s <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>. It simplifies the entire process, letting you investigate threats with ease and speed. <\/p>\n\n\n\n<p>Take a look at the key ways you can monitor and analyze network activity with the service.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Connections&nbsp;<\/h2>\n\n\n\n<p>Examining network connections involves looking at source and destination IP addresses, ports, URLs, and protocols. During this process, you can observe all activities that may pose a risk to the system, such as connections to known malicious domains and attempts to access external resources.\u00a0<\/p>\n\n\n\n<p>To correlate the network activity with other behaviors or components of the malware, ANY.RUN identifies the process name and <a href=\"https:\/\/any.run\/cybersecurity-blog\/advanced-process-details\/\" target=\"_blank\" rel=\"noreferrer noopener\">Process Identifier<\/a> (PID) initiating the connection. This allows you to gain a better understanding of the threat\u2019s functionality and purpose.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"221\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-1024x221.png\" alt=\"\" class=\"wp-image-9634\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-1024x221.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-300x65.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-768x165.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-1536x331.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-2048x441.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-370x80.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-270x58.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/connections_section-740x159.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The Connections tab monitors all the network activity on the system <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In the <em>Connections<\/em> section, additional attributes like the country (CN) and Autonomous System Number (ASN) provide context for the geographical location and the organization managing the IP address.&nbsp;<\/p>\n\n\n\n<p>The service also lists DNS requests that help you identify malicious domains used for Command &amp; Control (C&amp;C) communication or phishing campaigns.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case: Identifying Agent Tesla\u2019s Data Exfiltration Attempt&nbsp;&nbsp;<\/h3>\n\n\n\n<p>Consider the <a href=\"https:\/\/app.any.run\/tasks\/0845d9f1-8ab5-4755-a213-ab65d9693828\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">following sandbox session<\/a>. Here, we can discover a malicious connection to an external server.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"218\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1024x218.png\" alt=\"\" class=\"wp-image-9601\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1024x218.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-300x64.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-768x164.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1536x327.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-370x79.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-270x58.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-740x158.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious connection identified by the ANY.RUN sandbox and marked with a flame icon<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>We can navigate to the process that started this connection (PID 6904) to see the details.\u00a0\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"849\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1024x849.png\" alt=\"\" class=\"wp-image-9602\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-1024x849.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-300x249.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-768x637.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-370x307.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-270x224.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2-740x613.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image2.png 1029w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The sandbox shows that the process connected to a server controlled by attackers<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>The service displays two signatures related to the connection, which specify that it was made to a server suspected of data theft over the SMTP port. The sandbox also links the process of <a href=\"https:\/\/any.run\/malware-trends\/agenttesla\" target=\"_blank\" rel=\"noreferrer noopener\">Agent Tesla<\/a>, a malware family used by cyber criminals for remote control and data exfiltration.\u00a0\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1024x573.png\" alt=\"\" class=\"wp-image-9603\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1024x573.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-300x168.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-768x430.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-1536x859.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-370x207.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3-740x414.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image3.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata rule used for detecting Agent Tesla\u2019s malicious connection<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Thanks to ANY.RUN\u2019s integration of <a href=\"https:\/\/any.run\/cybersecurity-blog\/new-threat-details-window\/\">Suricata IDS<\/a>, you can discover triggered detection rules by navigating to the <em>Threats<\/em> tab.\u00a0The detection of data exfiltration over SMTP in this case is done without decryption. The sandbox relies solely on specific sequences of packet lengths characteristic of sending victim data.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HTTP Requests and Content&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN provides comprehensive analysis of HTTP requests and their content. To access header information, simply navigate to the <em>Network<\/em> tab. Here, you&#8217;ll find a detailed list of all HTTP requests recorded by the sandbox. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"224\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-1024x224.png\" alt=\"\" class=\"wp-image-9630\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-1024x224.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-300x66.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-768x168.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-1536x336.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-2048x448.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-370x81.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-270x59.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/requests_one-740x162.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>You can investigate HTTP Requests in detail in ANY.RUN<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Click on a specific request to view its headers, which include information such as the request method, user-agent, cookies, and response status codes.\u00a0<\/p>\n\n\n\n<p>ANY.RUN also offers static analysis of the resources transmitted as part of HTTP requests and responses. These may include HTML pages, binary, and other types of files. The sandbox extracts their metadata and strings.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case: Discovering  a Server for Collecting Stolen Passwords\u00a0<\/h3>\n\n\n\n<p>When investigating phishing attacks, it is sometimes necessary to check which server ends up receiving the passwords entered by victims on a malicious webpage. To accomplish this task, we need to enable Man-in-the-Middle (MITM) Proxy.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1024x576.png\" alt=\"\" class=\"wp-image-9604\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image4.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Switching on MITM Proxy takes just one click in the VM setup window<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>The feature acts as an intermediary between the malware and the server, allowing analysts to intercept and decrypt even HTTPS traffic, typically used for secure communication.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-1024x582.png\" alt=\"\" class=\"wp-image-9611\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-1024x582.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-768x436.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-1536x872.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one-740x420.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/phish_attack_one.png 1840w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN allows you to interact with the VM including by entering text <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Here is an <a href=\"https:\/\/app.any.run\/tasks\/0c89bf79-28cd-4acc-b326-cd02b3929ab8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">example of a typical attack<\/a> that is designed to trick users into entering their real login credentials on a fake webpage.\u00a0<\/p>\n\n\n\n<!-- Highlight Block HTML START -->\n<div class=\"window\">\n  <div class=\"window-header\">\n    <div class=\"pill\">Please Note<\/div>\n  <\/div>\n  <div class=\"window-body\">\n    <p>Under no circumstances should you enter real credentials when analyzing threats in the ANY.RUN sandbox. Instead, use a non-existent test email and password.<\/p>\n  <\/div>\n<\/div>\n<!-- Highlight Block HTML END -->\n\n\n<!-- Highlight Block CSS START -->\n<style>\n  .window {\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n\n    border-radius: 4px;\n    margin: 20px auto 50px auto;\n    padding: 20px 40px;\n    line-height: 2rem;\n  }\n\n  .window-header {\n    display: flex;\n    justify-content: center;\n    margin-bottom: 20px;\n  }\n\n  .pill {\n    background-color: #fff;\n    border-radius: 20px;\n    color: #333;\n    font-weight: bold;\n    padding: 8px 32px;\nborder: 1px solid rgba(75, 174, 227, 0.32);\n  }\n\n  @media (max-width: 480px) {\n    .window {\n      padding: 10px;\n    }\n    \n    .pill {\n      font-size: 14px;\n      padding: 6px 12px;\n    }\n  }\n<\/style>\n<!-- Highlight Block CSS END -->\n\n\n\n<p>After we enter a fake password, we need to navigate to the HTTP request section. Here, we need to start reviewing the HTTP POST requests, beginning with the most recent connection by time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"491\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-1024x491.png\" alt=\"\" class=\"wp-image-9612\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-1024x491.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-300x144.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-768x368.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-1536x736.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-2048x982.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-370x177.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-270x129.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/stolen_password-740x355.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The fake password we entered which was exfiltrated via Telegra<\/em>m<\/figcaption><\/figure><\/div>\n\n\n<p> \u00a0In most cases, you will be able to understand which server the web page is communicating with. In our example, the stolen data is being sent to Telegram.\u00a0<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAccess MITM Proxy and other PRO features of <span class=\"highlight\">ANY.RUN<\/span> <br>for free&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=network_analysis&#038;utm_term=021124&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nGet 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">Use Case: Collecting Information on Attackers\u2019 Telegram Infrastructure&nbsp;<\/h3>\n\n\n\n<p>Here is <a href=\"https:\/\/app.any.run\/tasks\/93e29328-a39a-4769-94d7-44256e1c9cbb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis of XWorm malware sample<\/a> that connects to a Telegram bot for exfiltrating data collected on the infected system.\u00a0<\/p>\n\n\n\n<p>Thanks to MITM Proxy, we can decrypt the traffic between the host and the Telegram bot.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"912\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-912x1024.png\" alt=\"\" class=\"wp-image-9605\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-912x1024.png 912w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-267x300.png 267w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-768x863.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-370x416.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-270x303.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5-740x831.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image5.png 1306w\" sizes=\"(max-width: 912px) 100vw, 912px\" \/><figcaption class=\"wp-element-caption\"><em>Bot token and chat_id are found in the query string<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>By examining the header of a GET request sent by XWorm we can identify a Telegram bot token along with the id of the chat controlled by attackers where information on successful infections is sent.\u00a0\u00a0<\/p>\n\n\n\n<p>Using the bot token and chat id, we can <a href=\"https:\/\/any.run\/cybersecurity-blog\/intercept-stolen-data-in-telegram\/\" target=\"_blank\" rel=\"noreferrer noopener\">gain access to the data exfiltrated<\/a> from other systems infected by the same sample.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Packets&nbsp;<\/h2>\n\n\n\n<p>Packet capture involves intercepting and recording network packets as they are sent and received by the system. In ANY.RUN, you can determine the specific data being transmitted and received, which can include sensitive information, commands, or exfiltrated data.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Through this detailed examination, you can uncover the structure and content of network packets, including the headers and payloads, which can reveal the nature of the communication. For instance, tracking the information contained in outgoing packets aids in identifying what data was stolen, such as passwords, logins, and cookies.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"562\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-1024x562.png\" alt=\"\" class=\"wp-image-9638\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-1024x562.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-768x422.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-1536x843.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-2048x1124.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-370x203.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-270x148.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/network_packers_raw-740x406.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Network stream window reveals data exchange for each connection<\/figcaption><\/figure><\/div>\n\n\n<p>To study network traffic packets effectively, you can use the <strong>Network stream<\/strong> window. Simply select the connection you\u2019re interested in to access RAW network stream data. Received packets are blue, while sent ones are green.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Case: Investigating a Pass-the-Hash Attack&nbsp;<\/h3>\n\n\n\n<p>Let\u2019s consider the <a href=\"https:\/\/app.any.run\/tasks\/542f921b-65ac-47db-9adb-3d15ba308de2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">following sandbox analysis<\/a>. Here, we can observe a theft of an NTLM hash via a malicious web page.\u00a0<\/p>\n\n\n\n<!-- Highlight Block HTML START -->\n<div class=\"window\">\n  <div class=\"window-header\">\n    <div class=\"pill\">About NTLM<\/div>\n  <\/div>\n  <div class=\"window-body\">\n    <p>NTLM (NT LAN Manager) authentication is a challenge-response protocol used by Microsoft Windows to verify user credentials. <br><br>It involves hashing a user&#8217;s password with the MD4 algorithm to create an NTLM hash, which is then used to encrypt a server-sent challenge. NTLM relay attacks intercept and reuse these hashes to impersonate users on other services, enabling unauthorized access without cracking the hash.<\/p>\n  <\/div>\n<\/div>\n<!-- Highlight Block HTML END -->\n\n\n<!-- Highlight Block CSS START -->\n<style>\n  .window {\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n\n    border-radius: 4px;\n    margin: 20px auto 50px auto;\n    padding: 20px 40px;\n    line-height: 2rem;\n  }\n\n  .window-header {\n    display: flex;\n    justify-content: center;\n    margin-bottom: 20px;\n  }\n\n  .pill {\n    background-color: #fff;\n    border-radius: 20px;\n    color: #333;\n    font-weight: bold;\n    padding: 8px 32px;\nborder: 1px solid rgba(75, 174, 227, 0.32);\n  }\n\n  @media (max-width: 480px) {\n    .window {\n      padding: 10px;\n    }\n    \n    .pill {\n      font-size: 14px;\n      padding: 6px 12px;\n    }\n  }\n<\/style>\n<!-- Highlight Block CSS END -->\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"510\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6.png\" alt=\"\" class=\"wp-image-9606\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6.png 728w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-300x210.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-370x259.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image6-270x189.png 270w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><figcaption class=\"wp-element-caption\"><em>Accessing 10dsecurity[.]com led to compromising the system\u2019s NTLM hash\u00a0<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>Once we enable MITM Proxy, we can see how the attack is executed. It starts with the victim\u2019s browser sending a request to access an HTML page, which triggers a redirect to an Impacket SMB server hosted on 10dsecurity[.]com.\u00a0<\/p>\n\n\n\n<p>Impacket is a Python-based toolkit designed for working with network protocols that can be used for harvesting NTLM authentication data.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-1024x684.png\" alt=\"\" class=\"wp-image-9607\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-1024x684.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-300x200.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-768x513.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-1536x1026.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-370x247.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-270x180.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7-740x494.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image7.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The sent and received packets of the host\u2019s communication with the SMB server<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>When the victim&#8217;s browser attempts to access the redirected resource via SMB, the Impacket-SMBServer intercepts the request and captures the following information:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The victim&#8217;s IP address&nbsp;<\/li>\n\n\n\n<li>NTLM Challenge Data&nbsp;<\/li>\n\n\n\n<li>The victim&#8217;s username&nbsp;<\/li>\n\n\n\n<li>The victim&#8217;s computer name\u00a0<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"728\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-1024x728.png\" alt=\"\" class=\"wp-image-9608\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-1024x728.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-300x213.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-768x546.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-1536x1092.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-370x263.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-270x192.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8-740x526.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image8.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata IDS detection rule used for identifying an impacket SMB server with a Wireshark filter<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN allows us to download PCAP data for further examination in specialized software like Wireshark. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"244\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-1024x244.png\" alt=\"\" class=\"wp-image-9641\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-1024x244.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-300x72.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-768x183.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-1536x366.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-370x88.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-270x64.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3-740x176.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/pcap3.png 1997w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN lets you download PCAP and SSL Keys log files<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>To make it easier to identify the connection of our interest, we can collect a display filter right from the sandbox.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"612\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1024x612.jpg\" alt=\"\" class=\"wp-image-9609\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1024x612.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-300x179.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-768x459.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-1536x918.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-370x221.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-270x161.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image-740x442.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/11\/image.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of the captured packets in Wireshark\u00a0<\/em>\u00a0<\/figcaption><\/figure><\/div>\n\n\n<p>Once we upload the data to the program and paste the filter, we can once again determine that it is indeed an impacket SMB server.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Packet capture, payload analysis, protocol dissection, DNS requests, and connection analysis are essential components of this process. By leveraging these techniques, security analysts can gain a comprehensive understanding of malicious activities, enabling them to develop effective countermeasures and protect against evolving cyber threats.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our\u00a0<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a>\u00a0simplifies malware analysis of threats that target both Windows and\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>\u00a0systems. Our threat intelligence products,\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>,\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>\u00a0and\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find\u00a0<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>\u00a0or files to learn more about the threats and respond to incidents faster.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds.&nbsp;<\/li>\n\n\n\n<li>Interact with samples in real time.&nbsp;<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior.&nbsp;<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=network_analysis&amp;utm_term=021124&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial \u2192\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network traffic analysis provides critical insights into malware and phishing attacks. Doing it effectively requires using proper tools like ANY.RUN&#8217;s Interactive Sandbox. It simplifies the entire process, letting you investigate threats with ease and speed. Take a look at the key ways you can monitor and analyze network activity with the service. Connections&nbsp; Examining network [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[57,10,34],"class_list":["post-9599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-training","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Capture, Decrypt, and Analyze Malicious Network Traffic<\/title>\n<meta name=\"description\" content=\"Learn actionable tips for analyzing malware&#039;s network traffic and see real-world examples investigated in the ANY.RUN sandbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN\",\"datePublished\":\"2024-11-02T11:41:05+00:00\",\"dateModified\":\"2024-11-02T13:35:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\"},\"wordCount\":1461,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Analyst Training\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\",\"name\":\"How to Capture, Decrypt, and Analyze Malicious Network Traffic\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-11-02T11:41:05+00:00\",\"dateModified\":\"2024-11-02T13:35:33+00:00\",\"description\":\"Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analyst Training\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/training\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Capture, Decrypt, and Analyze Malicious Network Traffic","description":"Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN","datePublished":"2024-11-02T11:41:05+00:00","dateModified":"2024-11-02T13:35:33+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/"},"wordCount":1461,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Analyst Training"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/","name":"How to Capture, Decrypt, and Analyze Malicious Network Traffic","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-11-02T11:41:05+00:00","dateModified":"2024-11-02T13:35:33+00:00","description":"Learn actionable tips for analyzing malware's network traffic and see real-world examples investigated in the ANY.RUN sandbox.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malicious-network-traffic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Analyst Training","item":"https:\/\/any.run\/cybersecurity-blog\/category\/training\/"},{"@type":"ListItem","position":3,"name":"How to Capture, Decrypt, and Analyze Malicious Network Traffic with ANY.RUN"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9599"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=9599"}],"version-history":[{"count":17,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9599\/revisions"}],"predecessor-version":[{"id":9654,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9599\/revisions\/9654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/9614"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=9599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=9599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=9599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}