How do you perform malware analysis on ransomware or malware that disrupts the user?

Still a noob to malware analysis so if it’s obvious I apologize. From some analysis videos I watched, it is performed using tools like process hacker which are on the same machine which has been infected. So in the cases of ransomeware which locks everything up or malware which might make all the icons float around the screen and open a million windows, how can someone run tools like that on the machine ?

Touch here for the full post on Network Security Noblemen tumblr

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s