Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Complete Dynamic Malware Analysis

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Navroop Kaur, Amit Kumar Bindal

Navroop Kaur and Amit Kumar Bindal. Article: A Complete Dynamic Malware Analysis. International Journal of Computer Applications 135(4):20-25, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Navroop Kaur and Amit Kumar Bindal},
	title = {Article: A Complete Dynamic Malware Analysis},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {135},
	number = {4},
	pages = {20-25},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Now a days thousands of malware samples are received by anti-malware companies on daily basis. And these large numbers are send for analysis by a number of automated analysis tools. These tool automatically execute a program in a controlled environment and generate a report describing the program’s behaviour.

This research paper is a contribution towards the Dynamic Malware analysis. The aim is to provide the general malware features found in recent malware by performing dynamic malware analysis using cuckoo sandbox executed on Windows XP (SP3). This paper also discusses the detailed information about techniques & tools used in dynamic malware analysis.


  1. Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, ACM Computing Surveys Journal, February 2012
  2. Ulrich Bayer, Engin Kirda, Christopher Kruegel, “Improving the Efficiency of Dynamic Malware Analysis” , 25th Symposium On Applied Computing (SAC), March 2010.
  3. Gadhiya, Kaushal Bhavsar “Techniques for Malware Analysis”.
  4. Uppal1, Vishakha Mehra2 and Vinod Verma3, “Basic survey on Malware Analysis, Tools and Techniques”,International Journal on Computational Sciences & Applications (IJCSA), February 2014
  5. NormanSandbox. , 2009.
  6. ThreatExpert. , 2009.
  7. MalwareAnalysisBasics,
  8. Gabriel Negreira Barbosa,Rodrigo Rubira Branco, “Prevalent Characteristics in Modern Malware”, Black Hat USA 2014
  9. Ulrich Bayer, Andreas Moser, Christopher Kruegel, and Engin Kirda, “Dynamic Analysis of Malicious Code” , Journal in Computer Virology, Springer Computer Science
  10. Cuckoo Sandbox,
  11. Ulrich Bayer, Imam Habibi, Davide Balzarotti ,Engin Kirda , and Christopher Kruegel “A View on Current Malware Behaviors".
  13. Moser, A., Kruegel, C., and Kirda, E. 2007b, “Limits of static analysis for malware detection” in 23rd Annual Computer Security Applications Conference (ACSAC)
  14. Anubis. , 2009
  15. Ed Skoudis, “Malware: Fighting Malicious Code“, dec 2003.
  16. C. Kruegel, W. Robertson and G. Vigna, “ Detecting Kernel-Level Rootkits Through Binary Analysis” In Annual Computer Security Application Conference (ACSAC), 2004.


Malware, Sandbox, Malicious.