Different types of malwares, on execution, perform different types of activities to avoid detection, maintain persistence and perform desired activities. The malware modifies file system, make different types of system API calls, performs network activities etc. Certain malwares can be concealed within word/pdf documents or normal executable files can be back doored. These files can be flagged by anti-virus but to analyze the actual behavior of the malware concealed within them an automated system is required to analyze machine activity when file is opened or any executable is executed. Design an automated dynamic malware analysis system for examining suspicious files in an isolated environment. It should execute and monitor the behavior of given malware and after completion of execution generate comprehensive reports on the capabilities, behavior and activities of the malware.
Notes: Simulate various types of malwares and their concealment approaches to demonstrate the solution
Sample Data Required: No