Detailed Course Outline
Introduction to Malware
- Who perpetrates these attacks?
- What is their goal?
- Types of malware
- Malware history and evolution
Malware Behavior and Techniques
- Malware lifecycle
- Infection, persistence, privilege escalation
- Stealth, network communication
Malware Analysis Overview
- Analysis types
- Tools and techniques
Triage Analysis
- Identifying malware
- Analyzing the PE header
- Examining static features
- Utilizing OSINT tools
Dynamic Analysis — OS Behavior
- Monitoring OS activity — process, file, registry
- Mapping execution flow
- Detecting malicious behaviors such as, persistence, injection, hooking
Dynamic Analysis — Network Behavior
- Malware communication techniques
- Analyzing malware traffic
- Controlling responses
Analyzing Malicious Office Documents
- Droppers and downloaders
- Debugging macro scripts
Automated Analysis
- Working with sandboxes
- Evasion techniques and how to bypass them