A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What is Malware Analysis? Types & Use cases
Cybersecurity 101/Threat Intelligence/Malware Analysis

What is Malware Analysis? Types & Use cases

Malware analysis is essential for understanding threats. Learn how to conduct effective analysis to improve your organization's defenses.

CS-101_Threat_Intel.svg
Table of Contents

Related Articles

  • What Is Predictive Threat Intelligence? How AI Helps Anticipate Cyber Threats
  • Cyber Threat Intelligence Lifecycle
  • What Is Behavioral Threat Detection & How Has AI Improved It?
  • What is Fileless Malware? How to Detect and Prevent Them?
Author: SentinelOne
Updated: July 21, 2025

Malware analysis involves examining malicious software to understand its behavior and impact. This guide explores the different types of malware analysis, including static and dynamic methods.

Learn about the importance of malware analysis in threat detection and incident response. Understanding malware analysis is crucial for organizations to enhance their cybersecurity capabilities.

Malware Analysis - Featured Image | SentinelOneWhat is Malware Analysis?

Malware analysis examines and studies malware to understand its behavior, capabilities, and potential impacts. This can be done manually, using tools and techniques to reverse engineer and analyze the code, or using automated tools and analysis platforms to identify and classify malware. Malware analysis is an essential part of cybersecurity and incident response, as it helps identify and understand an organization’s threats and develop effective strategies to defend against them.

Malware analysis enables your network to triage incidents by the level of severity and uncover indicators of compromise (IOCs). It also provides a more comprehensive threat-hunting image and improves IOC alerts and notifications.

Types of Malware Analysis

Malware analysis can be static, dynamic, or a hybrid of both types. When using static analysis, you’ll examine the file for signs of malicious intent, while dynamic analysis allows you to execute the suspected code in a sandbox environment.  Using a sandbox will isolate the malware from your live system, eliminating the ability to infect your production environment or allow the virus to escape into your network.

Malware Analysis Use Cases

Computer Security Incident Management

In this case, an organization has determined that malware may have infiltrated their network. A response team is sent to deal with the threat.

They perform malware analysis on malicious files and specify the danger and type of malware. They’ll also analyze what impact it will likely have on the organization’s system.

Malware Research

Academics or industry specialists can perform in-depth malware research. These professionals try to get the best possible understanding of how certain malware performs.

SentinelLabs have, for example, closely examined the anatomy of TrickBot Cobalt Strike Attacks and gained insights into FIN7 malware chains.

This level of research and understanding is vital for reverse-engineering malware and requires malware analysis, as well as the testing of malware in a sandbox environment.

Indicator of Compromise (IOC) Extraction

Software product and solution providers often perform bulk testing and analysis to determine potential IOCs. In turn, they can improve their security network to preemptively improve weak points in their system.

The Stages of Malware Analysis

There are four common steps to malware analysis that get more complex and specific the further into the process you are. There are four main stages:

1. Scanning – Automated Analysis

Fully automated tools rely on detection models formed by analyzing already discovered malware samples in the wild.  By doing so, these tools can scan suspicious files and programs to determine if they are malware.

Automated analysis can also produce a detailed report, including the network traffic, file activity, and registry keys. A tool like this is the fastest method and doesn’t require an analyst.

It is suited for sifting through large quantities of malware and testing a vast network. Subsequently, it also doesn’t include as much information.

2. Static Properties Analysis

Once the scan is complete, static property analysis looks closely at the malware. At this stage, analysts would examine the static properties of a threat without executing the malware. This is often something you’d do within an isolated environment or sandbox. Static properties include hashes, embedded strings, embedded resources, and header information.

Tools like disassemblers and network analyzers can get information on how the malware works at this stage.

3. Interactive Behavior Analysis

To gain further insight, analysts might want to run a malicious file in an isolated laboratory system to see its effects in action.

Interactive behavioral analysis allows the tester to observe and understand how malware affects the system, its registry, file system, process and network activities and how someone might replicate them.

A safe testing environment can be set up by downloading virtualization software to run a guest operating system. Testing malware in a sandbox like this is also called dynamic analysis.

The one great challenge with this is that malware can often detect when it is being run on a virtual machine and alter its behavior accordingly. Malware may remain dormant until certain conditions are met.

It’s possible to take a hybrid analysis approach by combining static and dynamic analysis methods.

4. Manual Code Reversing

Finally, analysts can manually reverse the file’s code and decode any encrypted data stored in the sample. This allows analysts to determine capabilities that didn’t show up during behavioral analysis and can add valuable insight to the findings.

Additional tools, like debuggers and disassemblers, are required at this stage.

Building a Malware Analysis Environment

For a malware researcher, building the right malware analysis environment is a crucial step in analyzing and investigating malware properly.  This consists of downloading, installing and configuring a Windows 10 and REMnux Linux virtual machine, setting up a private network for communication between virtual machines, building a custom Windows environment with SentinelLabs RevCore Tools, and capturing traffic from a Windows 10 virtual machine.

Enhance Your Threat Intelligence

See how the SentinelOne threat-hunting service WatchTower can surface greater insights and help you outpace attacks.

Learn More

Top Malware Analysis Tools

There are several different types of essential tools necessary for performing malware analysis so that you can avoid and understand cyber-attacks.  While many of the tools listed here are free, the paid versions are highly recommended in a professional setting.

Disassemblers: A disassembler, like IDA Pro or Ghidra, which was developed by the National Security Agency (NSA),  takes apart the assembly code instead of executing it, so that it can be statically analyzed. They also work with decompilers, which can convert binary code into native code.

Debuggers: A debugger, like x64dbg or Windbg is used to manipulate the execution of a program. This provides insights into what happens when the malware is run, and can help you to reverse engineer a malware sample to see how it operates.

It also allows analysts to control areas of the program’s memory to understand how it impacts a network.

Hex editors: A hex editor, like HxD, is a specialized editor that can open any type of file and show its contents byte by byte. This can be used to break down malware entirely and start translating its code.

Monitors: When you need to see real-time file system, Registry, and process/thread activity, you need to use an advanced monitoring tool like Process Monitor.  This tool displays a process tree that will show the relationships between all processes referenced in a trace and provide reliable capture of process details.

PE Analysis: Tools like PeStudio, PE-bear and pefile are great tools to consider when looking for freeware reversing tools for PE files.  They’re useful when trying to visualize a PE section layout, and can help you to detect file signatures, hard-coded URLs and IP addresses.

Network analyzers: This type of software, tells analysts how the malware interacts with other machines. It can showcase the threat’s connections and what data it is trying to send.

Protect Your System with Leading Edge-to-Edge Enterprise Security

SentinelOne gives you a centralized platform to prevent, detect, respond, and hunt in the context of all enterprise assets.

SentinelOne offers endpoint protection, detection and response, and IoT discovery and Control. For more information on malware analysis get in touch today.

Malware Analysis FAQs

Malware analysis is the process of examining suspicious files to understand what they do and how they work. You don’t just run the code – you study it to figure out its purpose, behavior, and potential damage. Security teams use this to identify threats, develop defenses, and understand how malware spreads through networks. It’s like taking apart a suspicious package to see what’s inside before it can cause harm.

Malware analysis helps you respond to incidents faster and more effectively. When you understand how malware works, you can identify infected systems, contain the threat, and prevent future attacks. It also helps you develop better security controls and train your team to recognize similar threats.

Without proper analysis, you might miss hidden malware or fail to completely remove it from your network.

There are three main types: static analysis, dynamic analysis, and hybrid analysis. Static analysis examines the code without running it – you look at file properties, strings, and structure. Dynamic analysis runs the malware in a safe sandbox environment to watch what it does. Hybrid analysis combines both methods to get a complete picture of the malware’s capabilities.

Finding and training skilled analysts is the biggest challenge – 94% of organizations struggle with staffing. The tools often lack automation and integration, making analysis time-consuming and error-prone.

Advanced malware uses obfuscation techniques to hide its true purpose, making static analysis difficult. Time pressure during incidents also limits how deep you can analyze suspicious files.

Malware analysis helps incident responders understand the scope and impact of an attack. You can identify how the malware got in, what it did, and which systems are affected. This information guides your containment and eradication efforts. Analysis also helps you develop indicators of compromise to find other infected systems and prevent reinfection.

You can analyze malware using automated tools like sandboxes for quick results. For deeper analysis, use disassemblers to examine the code structure and debuggers to watch it execute. Network analyzers help you understand how malware communicates with command-and-control servers. You can also use SentinelOne for malware analysis.

The primary goal is to understand the malware’s behavior, capabilities, and impact so you can defend against it. You want to know what the malware does, how it spreads, and what damage it can cause.

This information helps you develop signatures for detection, create patches for vulnerabilities, and improve your security controls. The end goal is always better protection against current and future threats.

Discover More About Threat Intelligence

What is an Advanced Persistent Threat (APT)?Threat Intelligence

What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) pose long-term risks. Understand the tactics used by APTs and how to defend against them effectively.

Read More
What is Spear Phishing? Types & ExamplesThreat Intelligence

What is Spear Phishing? Types & Examples

Spear phishing is a targeted form of phishing. Learn how to recognize and defend against these personalized attacks on your organization.

Read More
What is Cyber Threat Intelligence?Threat Intelligence

What is Cyber Threat Intelligence?

Cyber threat intelligence (CTI) helps organizations predict, understand, and defend against cyber threats, enabling proactive protection and reducing the impact of attacks. Learn how CTI enhances cybersecurity.

Read More
What is a Botnet in Cybersecurity?Threat Intelligence

What is a Botnet in Cybersecurity?

Botnets are networks of compromised devices used for malicious purposes. Learn how they operate and explore strategies to defend against them.

Read More
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use