CBRCOR Exam QuestionsBrowse all questions from this exam

CBRCOR Exam - Question 85


An engineer is utilizing interactive behavior analysis to test malware in a sandbox environment to see how the malware performs when it is successfully executed.

A location is secured to perform reverse engineering on a piece of malware. What is the next step the engineer should take to analyze this malware?

Show Answer
Correct Answer: D

After securing a location to perform reverse engineering on a piece of malware, the next logical step would be to disassemble the malware to understand how it was constructed. Disassembly involves converting the machine code of the malware into a more readable format, such as assembly language, allowing the engineer to examine its structure, logic, and possibly identify malicious functionalities. This method provides deep insights into the malware’s behavior and helps in understanding its purpose and potential impact.

Discussion

6 comments
Sign in to comment
chongchangchiOption: A
Sep 29, 2023

for me it should be A is the answer "Run the program through a debugger to see the sequential actions" before in the first place why did you put and analyze the malware on a isolated sandbox if you have just search it online? They're a lot of tools to perform static and dynamic malware analysis like Malware STATIC Analysis tools: Hybrid Analysis Cuckoo Sandbox Jotti Valkyrie Sandbox Malware DYNAMIC Analysis tools: Process Explorer OpManager Monit Advanced Windows Service Manager Process Hacker Netwrix Service Monitor AnVir Task Manager please correct me if I'm wrong.

jay_c_an
Sep 12, 2024

this was on recent test question. Agree with A. Doesn't make sense to place it in a sandbox for online research.

danfer
May 8, 2024

Second sentence says the RE is about to perform - so I will go with D as it is part of RE and that is the next step.

ETSec
Jul 21, 2024

D. Disassemble the malware to understand how it was constructed After securing a location to perform reverse engineering on a piece of malware, the next step the engineer should take is to disassemble the malware. Disassembly is the process of converting machine code into assembly code, which is a more human-readable form of the code. This allows the engineer to understand how the malware was constructed and how it works. The engineer can also identify any malicious functions and understand the malware's behavior and purpose.

DrVoIP
Aug 18, 2024

The next step the engineer should take is to run the program through a debugger to see the sequential actions. This will allow the engineer to step through the malware code and understand what it is doing at each step, including any malicious actions it may be attempting. Debugging can help the engineer identify potential vulnerabilities in the system and develop effective countermeasures. - chatGPT

27ea763Option: A
Jan 23, 2025

A would be the smartest choice