Skip to main content

Abstract

Malware is a threat to computer users regardless of which operating system and hardware platform one is using. Android and Microsoft Windows are the most popular operating systems in terms of mobile phone and personal computer, respectively. Due to the wide use of these operating systems, threat actors have seen them as a relevant attack surface and are frequently targeting them. This has kept the analysts on their toes for quickly identifying, responding and preventing systems and infrastructure from these malicious code attacks. With the limitations in the static analysis techniques, analysts have moved to dynamic analysis of these malicious codes, which provide them with various options ranging from sandboxes to tools specifically designed for dynamic analysis. With every tool having its own limitations, the analysts are always on the lookout for the apt tools that will be best for a specific task. This research paper will analyse some of the tools used for dynamic malware analysis and compare their performance with that of the cuckoo sandbox.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. What is Malware? Forcepoint (2020) Retrieved from https://www.forcepoint.com/cyberedu/malware

  2. RIPS: RIPS—automate security testing and manage your risks (2020). Retrieved from https://www.ripstech.com/product/tour/

  3. Comodo News and Internet Security Information: What Is Malware Analysis? Malware Analysis Techniques (2020). https://blog.comodo.com/malware/different-techniques-for-malware-analysis/

  4. Aslan, Ö., Samet, R.: Investigation of possibilities to detect malware using existing tools. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1277–1284. IEEE (2017)

    Google Scholar 

  5. Jamalpur, S., Navya, Y.S., Raja, P., Tagore, G., Rao, G.R.K.: Dynamic malware analysis using cuckoo sandbox. In: 2018 Second international conference on inventive communication and computational technologies (ICICCT), pp. 1056–1060. IEEE (2018)

    Google Scholar 

  6. Ijaz, M., Durad, M.H., Ismail, M.: Static and dynamic malware analysis using machine learning. In: 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 687–691. IEEE (2019)

    Google Scholar 

  7. Infosec Resources: Static malware analysis—infosec resources (2020). Retrieved from https://resources.infosecinstitute.com/topic/malware-analysis-basics-static-analysis/

  8. SearchSecurity: What Is Sandbox (Software Testing and Security)? (2020). Definition From Whatis.Com. Retrieved from https://searchsecurity.techtarget.com/definition/sandbox

  9. Sihwail, R., Omar, K., Ariffin, K.A.Z.: A survey on malware analysis techniques: static, dynamic, hybrid and memory analysis. Int. J. Advan. Sci. Eng. Inform. Technol. 8(4–2), 1662 (2018)

    Article  Google Scholar 

  10. Bermejo Higuera, J., Abad Aramburu, C., Bermejo Higuera, J.R., Sicilia Urban, M.A., Sicilia Montalvo, J.A.: Systematic approach to malware analysis (SAMA). Appl. Sci. 10(4), 1360 (2020)

    Article  Google Scholar 

  11. Al-Rushdan, H., Shurman, M., Alnabelsi, S.: On Detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks (2020)

    Google Scholar 

  12. Yin, H., Liang, Z., Song, D.: HookFinder: identifying and understanding malware hooking behaviors (2008)

    Google Scholar 

  13. Code.google.com.: Google Code Archive—long-term storage for google code project hosting (2021). Retrieved from https://code.google.com/archive/p/regshot

  14. Docs.microsoft.com.: Process Explorer—Windows Sysinternals (2021). Retrieved from https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer

  15. Docs.microsoft.com.: Process monitor—windows sysinternals (2021). Retrieved from https://docs.microsoft.com/en-us/sysinternals/downloads/procmon

  16. “Cuckoo Sandbox—Automated Malware Analysis”. Cuckoosandbox.org. https://cuckoosandbox.org/

  17. Malwarebytes Lebs: Automating malware analysis with Cuckoo Sandbox (2016). Available at: https://blog.malwarebytes.com/threat-analysis/2014/04/automating-malware-analysis-with-cuckoo-sandbox/ (Accessed: 2021)

  18. Bai, J., Shi, Q., Mu, S.: A Malware and variant detection method using function call graph isomorphism. Security and Communication Networks (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Appendix

Appendix

1

Md5deep

14

IDA Pro

2

Strings

15

OllyDbg

3

PEiD

16

WinDbg

4

Dependency Walker

17

x64Dbg

5

PEView

18

Capture BAT

6

Resource Hacker

19

CFF Explorer

7

PE Explorer

20

Hexeditor

8

Procmon

21

ImportREC

9

Process Explorer

22

Memoryze

10

Regshot

23

OfficeMalScanner

11

Apate DNS

24

GMER

12

Inetsim

25

Fiddler

13

Wireshark

26

Detect It Easy (DIE)

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lebbie, M., Prabhu, S.R., Agrawal, A.K. (2022). Comparative Analysis of Dynamic Malware Analysis Tools. In: Dua, M., Jain, A.K., Yadav, A., Kumar, N., Siarry, P. (eds) Proceedings of the International Conference on Paradigms of Communication, Computing and Data Sciences. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-5747-4_31

Download citation

Publish with us

Policies and ethics