{"id":9010,"date":"2021-02-25T11:58:03","date_gmt":"2021-02-25T06:28:03","guid":{"rendered":"https:\/\/www.varutra.com\/?p=9010"},"modified":"2022-12-02T13:11:57","modified_gmt":"2022-12-02T07:41:57","slug":"malware-analysis-part-2-setting-up-the-lab","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/","title":{"rendered":"MALWARE ANALYSIS &#8211; PART 2 (SETTING UP THE LAB)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Setting up the Malware Analysis Lab - Varutra Consulting\"><br \/>\nIn the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and a brief introduction to Malware Analysis. In this section, we will be setting up the testing lab for dynamic and static analysis. So, let us begin with setting up the environment and labs.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Setting up Malware Analysis Lab:<\/strong><\/h3>\n<p>To exercise the functionality of malware, we need to simulate the network services. The risk associated with this would be spamming, denial-of-service attacks. The first thing you can take into consideration is not using the main computer or host operating system. The primary functionality of the malware would be relying on the internet. So, it will check whether the host has an internet connection. The modern piece of malware comes with anti-analysis features.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Sandbox:<\/strong><\/h3>\n<p>Sandbox environment is an isolated virtual machine that can be used to execute malicious code or malware without affecting the actual host. It decreases the risk of infecting the host OS from malware.<\/p>\n<p>To carry out dynamic analysis of malware, we need a sandbox environment or any isolated operating system. Sandboxing helps us to carry out dynamic analysis and helps us to protect our system from malware.<\/p>\n<p>There are few sandboxes that are freely available over the internet. Some of them are mentioned below:<\/p>\n<ul>\n<li><strong>Any.run:<\/strong><\/li>\n<\/ul>\n<p>Any.run is an online sandbox used for malware analysis. Here you can execute the suspicious executable or URL, in which you can check the real-time execution and behavior of any malware or suspicious programs. You can navigate to the URL <a href=\"https:\/\/any.run\/\">https:\/\/any.run\/<\/a> and register yourself for free and get hands-on experience.<\/p>\n<p>*<\/p>\n<p style=\"text-align: center\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9015 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Anyrun.png\" alt=\"Anyrun - Setting up Sandbox environment lab for Malware Analysis \" width=\"606\" height=\"320\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Anyrun.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Anyrun-300x158.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/strong><\/p>\n<ul>\n<li><strong>VirusTotal:<\/strong><\/li>\n<\/ul>\n<p>Virus Total is an online service that can further analyze the files and URLs for detection of any Virus, Trojans, Worms, or any other malicious files. It is a kind of antivirus engine and scanner used to detect viruses.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9016 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/VirusTotal.png\" alt=\"VirusTotal\" width=\"606\" height=\"318\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/VirusTotal.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/VirusTotal-300x157.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>These are the freely available tools over the internet which can be used for analysis. In Static Analysis, we get the basic idea of the malicious file or what kind of code\/data it has.<\/p>\n<p>To get a further detailed description or the behavior of the actual malicious file, we need to conduct the Dynamic Malware Analysis. For further analysis, we will need to have Virtual Environment\/Sandbox.<\/p>\n<p>Let us get an overview of how to set up a virtual environment. You can download any virtual OS for windows like 7, 8, 10.<\/p>\n<p>The following are the prerequisites for setting up a Virtual Environment\/Sandbox:<\/p>\n<ul>\n<li>Virtual Box\/ VM Ware<\/li>\n<li>Windows Operating System<\/li>\n<\/ul>\n<p>You can download OS and Virtual Box from the link provided in the description:<\/p>\n<ul>\n<li><a href=\"https:\/\/developer.microsoft.com\/en-us\/microsoft-edge\/tools\/vms\/\">https:\/\/developer.microsoft.com\/en-us\/microsoft-edge\/tools\/vms\/<\/a><\/li>\n<li><a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\">https:\/\/www.virtualbox.org\/wiki\/Downloads<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Setting Up Sandbox Environment:<\/strong><\/h3>\n<p>Points to be taken care of before initiating the process:<\/p>\n<ul>\n<li>Malware nowadays is designed with an anti-malware analysis feature due to which it gets lengthy and a bit cozy for analyzing the malware<\/li>\n<li>Malware when executed, will check whether the operating system is a host or guest operating system. And will behave accordingly<\/li>\n<li>Host OS and Guest OS should be on cross-platform.<\/li>\n<\/ul>\n<p>For example: Host OS can be Linux distribution or Mac OS<\/p>\n<ul>\n<li>The guest operating system can be Win 7 as this OS is more reliable for sandbox environments.<\/li>\n<li>There are few checks which need to implement on Virtual Environment i.e.: Internet Connection, Guest OS needs to set as Host OS in virtual box<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Observing the above-mentioned points, it&#8217;s recommended to set up a virtual environment accordingly.<\/p>\n<p>Let us get the actual scenario of setting up this environment:<\/p>\n<p><strong>Step 1:<\/strong> Import Virtual OS<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9017 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Import-Virtual-OS.png\" alt=\"Import Virtual OS\" width=\"606\" height=\"285\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Import-Virtual-OS.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Import-Virtual-OS-300x141.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>After importing any virtual OS we need to configure the virtual environment. For any malware analysis, we need to create an isolated environment. In the actual scenario, we will be executing the malicious code, as this process requires the actual isolated system. So below configurations\u00a0are required to create an isolated system. While performing the analysis external drives[HDD, Pen drive]should not be attached or connected.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Step 2:<\/strong> Configuring the OS<\/p>\n<ul>\n<li>Configurations: 4 GB Ram<\/li>\n<li>Network Adapter: Set to Host-Only<\/li>\n<li>Shared Folder: Set to None<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>After configuring the virtual environment, we require the analysis tools to analyze the malicious file. There are freely available tools that can be downloaded and used to examine the same. But it will take a long process of downloading all the tools one by one. Flare VM has pre-build tools for malware analysis which will save time for downloading the tools. Flare VM has a combined package of all required tools for analysis. Let us move to a further step for downloading Flare VM.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 3<\/strong>: Downloading &amp; Installing Flare VM:<\/p>\n<p>To download the Flare VM you can get the GitHub link and download the files from the following references. You can follow up on this reference and download the VM and install it.<\/p>\n<p><a href=\"https:\/\/github.com\/fireeye\/flare-vm\">https:\/\/github.com\/fireeye\/flare-vm<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9018 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Flare-VM.png\" alt=\"Flare VM\" width=\"606\" height=\"455\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Flare-VM.png 606w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Flare-VM-300x225.png 300w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>After installing the Flare VM, it should look like this. As it has a combined package of required tools.<\/p>\n<p>That is all you would need to set up. In the last and final part of the blog for Malware Analysis, we will understand the practical in-depth approach towards the analysis.<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Vijay Damor<\/strong><\/p>\n<p>Attack &amp; Pentest Team<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and a brief introduction to Malware&#8230;<\/p>\n","protected":false},"author":4,"featured_media":9020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[280],"tags":[347,348,349],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Setting up Testing Lab for Dynamic &amp; Static Malware Analysis\" \/>\n\t\t<meta property=\"og:description\" content=\"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1060\" \/>\n\t\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t\t<meta property=\"article:section\" content=\"Viruses &amp; Malware\" \/>\n\t\t<meta property=\"article:tag\" content=\"malware analysis\" \/>\n\t\t<meta property=\"article:tag\" content=\"sandbox\" \/>\n\t\t<meta property=\"article:tag\" content=\"virtual\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-02-25T06:28:03+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T07:41:57+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Setting up Testing Lab for Dynamic &amp; Static Malware Analysis\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#article\",\"name\":\"Setting up Testing Lab for Dynamic & Static Malware Analysis\",\"headline\":\"MALWARE ANALYSIS &#8211; PART 2 (SETTING UP THE LAB)\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Setting-up-the-Malware-Analysis-Lab.png\",\"width\":1060,\"height\":593,\"caption\":\"Setting up the Malware Analysis Lab\"},\"datePublished\":\"2021-02-25T11:58:03+05:30\",\"dateModified\":\"2022-12-02T13:11:57+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":2,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#webpage\"},\"articleSection\":\"Viruses &amp; Malware, Malware Analysis, Sandbox, Virtual\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#listItem\",\"position\":2,\"name\":\"MALWARE ANALYSIS - PART 2 (SETTING UP THE LAB)\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/\",\"name\":\"Setting up Testing Lab for Dynamic & Static Malware Analysis\",\"description\":\"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Setting-up-the-Malware-Analysis-Lab.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#mainImage\",\"width\":1060,\"height\":593,\"caption\":\"Setting up the Malware Analysis Lab\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/malware-analysis-part-2-setting-up-the-lab\\\/#mainImage\"},\"datePublished\":\"2021-02-25T11:58:03+05:30\",\"dateModified\":\"2022-12-02T13:11:57+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Setting up Testing Lab for Dynamic &amp; Static Malware Analysis<\/title>\n\n","aioseo_head_json":{"title":"Setting up Testing Lab for Dynamic & Static Malware Analysis","description":"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Setting up Testing Lab for Dynamic &amp; Static Malware Analysis","og:description":"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","og:image:width":"1060","og:image:height":"593","article:section":"Viruses &amp; Malware","article:tag":["malware analysis","sandbox","virtual"],"article:published_time":"2021-02-25T06:28:03+00:00","article:modified_time":"2022-12-02T07:41:57+00:00","twitter:card":"summary_large_image","twitter:title":"Setting up Testing Lab for Dynamic &amp; Static Malware Analysis","twitter:description":"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"4 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#article","name":"Setting up Testing Lab for Dynamic & Static Malware Analysis","headline":"MALWARE ANALYSIS &#8211; PART 2 (SETTING UP THE LAB)","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","width":1060,"height":593,"caption":"Setting up the Malware Analysis Lab"},"datePublished":"2021-02-25T11:58:03+05:30","dateModified":"2022-12-02T13:11:57+05:30","inLanguage":"en-US","commentCount":2,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#webpage"},"articleSection":"Viruses &amp; Malware, Malware Analysis, Sandbox, Virtual"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#listItem","position":2,"name":"MALWARE ANALYSIS - PART 2 (SETTING UP THE LAB)","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/","name":"Setting up Testing Lab for Dynamic & Static Malware Analysis","description":"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#mainImage","width":1060,"height":593,"caption":"Setting up the Malware Analysis Lab"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/#mainImage"},"datePublished":"2021-02-25T11:58:03+05:30","dateModified":"2022-12-02T13:11:57+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"9010","title":"Setting up Testing Lab for Dynamic &amp; Static Malware Analysis","description":"In this article, we will be setting up the testing lab for dynamic and static malware analysis. So, let us begin with setting up the sandbox environment.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Malware Analysis\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":90},\"additional\":[{\"keyphrase\":\"Sandbox Environment\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Sandbox\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/02\/Setting-up-the-Malware-Analysis-Lab.png","og_image_width":"1060","og_image_height":"593","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Viruses &amp; Malware","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:11:54","updated":"2022-12-02 07:49:24"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/viruses-malware\/\" title=\"Viruses &amp; Malware\">Viruses &amp; Malware<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tMALWARE ANALYSIS \u2013 PART 2 (SETTING UP THE LAB)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Viruses &amp; Malware","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/viruses-malware\/"},{"label":"MALWARE ANALYSIS &#8211; PART 2 (SETTING UP THE LAB)","link":"https:\/\/www.varutra.com\/varutravrt3\/malware-analysis-part-2-setting-up-the-lab\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9010"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=9010"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9010\/revisions"}],"predecessor-version":[{"id":20313,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/9010\/revisions\/20313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/9020"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=9010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=9010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=9010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}