


If yes, then it will try to exploit the vulnerabilities of the VM and then target host/Network.Ģ. Malware might be constructed to check whether it is running on any VM/Sandbox. There are many ways that malware can escape from the sandbox and it depends on who is building the malware. Why we have to avoid using Sandbox in Production Network?. Disable all the default Anti-Virus solutions, OS firewall, and other security programs.

Please refer the below-mentioned image for the importance of restore point. Set up and take backup of restore point of the virtual machine so that we can revert it back after testing the malware.Make sure all the required tools and software are installed and running.Should be isolated and make sure that is not connected to an internal network.Avoid building the sandbox in the production network.So please make sure that we have followed below mentioned precautions. This is the time to learn how to use the tools to get those artifacts.īefore getting into the analysis, there are important precautions we have to take so that we shouldn’t miss anything and shouldn’t face any infection. Now, by the previous posts, we know that what are the artifacts can be identified by the using static analysis and dynamic analysis of a malware. DYNAMIC MALWARE ANALYSIS – PROCESS MONITOR AND EXPLORER
