Malware Analysis


In malware analysis, CCFIS artifacts their own virtualization sandbox environment for the purpose of the research and analysis different malwares which was apprehend by our CCFIS sensors. Our malware analyzing recipe is based on monitoring, study their behaviors and its activities. Research include viruses, worms, Trojans, adwares, spywares, backdoors, rootkits for various operating systems and Network Devices. This approach helps in explaining the complete working, and influence of malware when any system in or outside the industry get infected.

When an incident occurs, malware analysis enables the security team to analyze and interpret events, thus helping prevent losses and restore normal operations as quickly as possible. We provide Post-incident malware analysis, helps identify ways to improve security architecture and prevent similar incidents. Our course includes various key techniques for examining malicious code like static analysis, dynamic analysis, memory analysis and reverse engineering.

Our research is based on six steps of the incident response process:
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons learned

By following these six steps, our research team provide the scenario in which they can recover from an incident with as little time and money as possible, while also ensuring that the incident will not happen again. During the preparation phase, it is an important component of in-depth security strategy. When an incident occurs, malware analysis enables the security team to analyze and interpret events, thus helping prevent losses and restore normal operations as quickly as possible. We provide Post-incident malware analysis, helps identify ways to improve security architecture and prevent similar incidents. Our course includes two key techniques for examining malicious code — static analysis and dynamic analysis.

Our research is based on the following analysis:

Vulnerability analysis: Our research includes how vulnerabilities are discovered and exploited. Our team will explore various languages and the compilation process in order to understand what protections can be automatically applied against vulnerabilities within the constraints of the language.

Malware analysis: Our research includes current malware, as well as develops techniques for creating malware that is resilient against defensive techniques.

Defense analysis: We will explore defenses as found in practice, and as proposed by researchers while investigating the limitations of defenses.