Malware Triage is quick analysis of suspicious files to determine what they are and what they do. You're not writing a full reverse engineering report - you're answering: Is this malicious? What does it do? What are the IOCs?
Think of it like a doctor doing a quick exam. You check vital signs, look for obvious symptoms, and decide: Is this a cold or something serious? Malware triage checks hashes, strings, imports, and behavior to quickly categorize a threat.
Safety First
NEVER analyze malware on your regular work machine! Always use an isolated virtual machine or sandbox. Assume every sample is dangerous until proven otherwise.
Safe Handling
Static Analysis
Sandbox Analysis
Privacy Considerations
When uploading to public sandboxes, remember: the file becomes public! If you're analyzing a targeted attack on your organization, the attacker might monitor VirusTotal to know they've been caught. Consider this in your decision.
Behavioral Analysis
Extracting IOCs
Document Malware
Triage Process
Malware Triage Methodology
Malware Triage Workflow
1
Safe SetupIsolated VM, tools ready, network controlled
2
Hash CheckCalculate SHA256, check VirusTotal
3
Static AnalysisStrings, imports, PE info
4
SandboxUpload to online sandbox OR local VM
5
BehaviorProcess, network, file, registry activity
6
Extract IOCsHashes, IPs, domains, paths
7
DocumentReport findings, recommend actions
Knowledge Check
Challenges
Key Takeaways
- Always analyze malware in isolated environments - VMs or sandboxes
- Check hashes against VirusTotal first - no need to reinvent the wheel
- Static analysis (strings, imports) reveals intent without execution
- Suspicious imports: CreateRemoteThread, URLDownloadToFile, RegSetValue
- Extract and document IOCs: hashes, C2 IPs/domains, file paths, registry
- 5-minute triage: hash → basics → strings → sandbox → document