• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

How to use AnyRun for in-depth malware analysis

AnonyViet by AnonyViet
January 26, 2023
in Security
0

AnyRun is a sandbox analysis application used to open suspicious files or visit websites and record the activities of applications or websites related to network or system performance. You can also subscribe to unlock even more features, but for your purposes the free version is more than enough. In this article, I will share two different ways that I use this powerful tool.

Join the channel Telegram of the AnonyViet 👉 Link 👈

In short if you doubt a Is the application a virus?let it run on AnyRunone copy process analysis appears and you’ll see which components of Windows the application affects.

Research malicious code on AnyRun

The first way to use AnyRun is to research malicious code using the results of other people’s previous research. In the free version, all submissions are public. This makes AnyRun a very valuable tool for Open Source Intelligence (OSINT). We use these public assets to identify malware, extract Indicators of Compromise (IOC) and Behaviors of Compromise (BOC), and to identify threat trends. From the homepage, click on the icon that looks like dog ear shape to view research results publicly. This list is updated in real time as people submit samples for analysis. Use the filter icon to the right of the search bar to narrow your search.

Research on AnyRun

Eg: if I see a suspicious domain while tracking or searching, I can use the filter above to search for available public studies. Or if you’re interested in specific malware like Ursnifyou can find the malware by entering its name in the above fields.

Analyze malware with AnyRun

The second way to use AnyRun is analytics. If you cannot find existing studies, you can submit a URL or file for analysis. After you create your free account, click New Task. Basic mode allows you to choose your operating system and then provide a URL or upload a file for analysis. An advanced screen is available if you want to make any adjustments like auto-acknowledge UAC, Anti-evasion, Browser Type and use Fakenet or Tor. The gray option requires you to subscribe to Anyrun.

How to use AnyRun - an in-depth malware analysis website

Once everything is set up, click Run. You will then be able to view the malware’s execution in real time or visit any URL you provide.

The session will end by displaying the results of the analysis. URLs listed in the browser bar can be saved as reference or shared with others.

It’s important to note that in the free version, all running tasks are public, which means everyone else can see the results. So do not run any malware or visit any websites that you think are targeting your organization or may reveal sensitive information. You also need to be careful of two things: session timeouts and user request actions.

Session timeout

AnyRun by default will only run the virtual machine for 60 seconds. While the analysis is running, you can press Add 60s in the top right box to add 60 seconds. You only have a few time extensions with the free version. This is important because sometimes the download takes a long time or the malware author slows down the attack time to avoid automatic sandbox analysis tools. Another reason you might want more time is because you need to perform user actions.

User request action

Sometimes the malware or website you are trying to analyze will ask you to take some action. Your mouse and keyboard can be used in the virtual machine. For example, an unzipped file might have several files inside, and you’ll need to choose which one to run. Or a credential scam site may ask for your information to proceed. Be aware of these types of actions and be ready to extend the session time if needed.

Analysis results

Regardless of whether you’ve found existing studies or created your own research sample, you’ll have a wealth of information once you’ve done your analysis.

Information

Anyrun malware analysis results

  • Sample source: environmental conditions under which the file or url is run and threats are detected.
  • IOC to list all relevant captured IOCs.
  • Sample sample download option.
  • Process graph to show parent-child relationships of observed processes. In this screen, you can click on any item to get more information about it.
  • ATT&CK matrix shows the techniques observed in the sample.

Process

Process

  • The related processes are listed using the full command line as parent processes and nested child processes. The icons displayed in the process ID show behaviors such as information networking, launched executables, etc.
  • Clicking on any of these brings up the details window at the bottom with additional information, warnings, and hazards.
  • The “More Info” advanced details screen shows the full command line, as well as the system-level actions of this process, such as modified files, registry changes, network traffic, and more. For example: clicking on the PowerShell process and then clicking “More Info” will bring up the Base64 encoded command.

Network

Network

  • HTTP Requests will show HTTP results, calling process, full URL, document type, and more. Clicking on one of the items displays the information, Exchangeable Image File (EXIF), Hex data, as well as a link to download the resulting data.
  • Connections shows connection by protocol, calling process, Domain/IP/ASN information, port and traffic. Clicking on one of the entries will show a Hex dump of the packet data in the network session. Here we can see things like HTTP request and response headers as well as payload data.
  • The DNS request shows the query and response.
  • Threats will have alerts triggered from a Suricata IDS instance with associated alert details.
  • The PCAP icon on the far right allows you to download a packet capture of the sample.

Files

Files

  • Modify files shows the process, full path, and filename and file type of any file created or modified.
  • Clicking on any of these will bring up the details of the file including the hash, MIME, asset preview, and even the option to download a copy.

Conclusion

I use this tool daily for threat analysis and research to help build a community of threat search and ever-changing threat awareness. Finally, AnyRun has a pretty intuitive interface and I hope I’ve covered all of its extremely useful features to encourage you to give it a try.

The article achieved: 5/5 – (100 votes)

Tags: AnalysisAnyRunindepthMalware
Previous Post

Lesson 54: How to highlight different cells in an Excel row

Next Post

Top 3 Websites that DevOps needs to know

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Top 3 Websites that DevOps needs to know

Top 3 Websites that DevOps needs to know

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

How to block pop-up requires location on Safari so as not to be disturbed

How to block pop-up requires location on Safari so as not to be disturbed

August 9, 2025
Openai launched GPT-5: Smarry and free for everyone!

Openai launched GPT-5: Smarry and free for everyone!

August 8, 2025
4 ways to fix bluetooth connectivity on Windows 11

4 ways to fix bluetooth connectivity on Windows 11

August 8, 2025
How to receive 3 months of free chatgpt plus from shopee

How to receive 3 months of free chatgpt plus from shopee

August 7, 2025
How to block pop-up requires location on Safari so as not to be disturbed

How to block pop-up requires location on Safari so as not to be disturbed

August 9, 2025
Openai launched GPT-5: Smarry and free for everyone!

Openai launched GPT-5: Smarry and free for everyone!

August 8, 2025
4 ways to fix bluetooth connectivity on Windows 11

4 ways to fix bluetooth connectivity on Windows 11

August 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to block pop-up requires location on Safari so as not to be disturbed

How to block pop-up requires location on Safari so as not to be disturbed

August 9, 2025
Openai launched GPT-5: Smarry and free for everyone!

Openai launched GPT-5: Smarry and free for everyone!

August 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí mm88 8XBET mm88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply