What's Your Malware Analysis Process? Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By Lenny Zeltser
L
Lenny Zeltser
Community Contributor
Quizzes Created: 1 | Total Attempts: 11,195
| Attempts: 11,196 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Which of the following tools best supports the concept of breakpoints?

Explanation

A debugger lets the malware analyst step through the most interesting parts of the code, interacting with it and observing the effects of its instructions to understand its purpose. A breakpoint is a condition defined by the analyst that tells the debugger when it should pause the execution of the program, allowing the analyst to interact with the program with the help of the debugger's capabilities.

Submit
Please wait...
About This Quiz
Whats Your Malware Analysis Process? Quiz - Quiz


Here is a quick and interesting 'What's your malware analysis process' quiz designed to assess your malware analysis skills and help you learn something new. Do you know... see moreeverything about malware analysis? There is a chance that your malware and reverse-engineering skills might need a tune-up. Take this quiz and see how well you can score on this test. Don't worry; this quiz consists of easy questions that'll keep you engaged and help you revise your skills. So, get ready to test your brain skills. All the best!
see less

2. Which of the following Windows registry keys is most useful for malware that aims at maintaining persistent presence on the infected system?

Explanation

A malicious program usually wants to ensure that it continues to run on the system even after a reboot. There are numerous ways of accomplishing this, including adding an entry to the HKLM\Software\Microsoft\Windows\CurrentVersion\Run registry key that points to the specimen's file.

Submit
3. Which of the following defensive measures do malware authors use to encode the original executable to protect it against static code analysis?

Explanation

By using a "packing" utility, malware authors encode, encrypt or obfuscate the original executable, making it more difficult to analyze using static code analysis techniques. In such cases, the reverse-engineer typically has to unpack the program using a variety of approaches that might be challenging and time-consuming.

Submit
4. Which of the following system calls is most likely to be used by a keylogger?

Explanation

GetAsyncKeyState determines whether the specified key is pressed at the moment when this system call is made. One of the ways a keylogger can spy on the user's keyboard activities is to repeatedly iterate through all likely key values, checking whether each key is pressed.

Submit
5. What are the two most common phases of malware analysis? 

Explanation

Behavioral analysis examines the malware specimen's interactions with its environment: the file system, the registry (if on Windows), the network, as well as other processes and OS components. As the malware investigator notices interesting behavioral characteristics, he or she modifies the laboratory environment to evoke new characteristics. Code analysis reverse-engineers the malicious program to understand the code that implements the specimen's behavior. When looking at compiled programs, this process involves using a disassembler, a debugger and, perhaps, a decompiler to examine the program's low-level assembly or byte-code instructions.

Submit
6. Which of the following terms refers to a field in the PE header that specifies the address of the instruction that the OS should execute first after loading the executable?

Explanation

The PE ("Portable Executable") header of a Windows executable stores critical information about the program that allows the Windows operating system to properly run the executable. One of the fields stores in the header is the Entry Point. This field stores the address of the instruction within the program that the operating system needs to execute first to begin running the program.

Submit
7. In the context of malware analysis, what does the term "patching" refer to?

Explanation

Malware analysts frequently patch the malicious program to modify how it executes, even though they typically don't have access to the program's original source code. For instance, the analyst might locate a defensive measure built into the specimen to confuse the analyst, and use patching to render that measure ineffective.

Submit
8. Which x86 register is most commonly used for storing a function's return value in an assembler?

Explanation

The x86 instruction set supports several general-purpose registers. EAX is one of them. Although general-purpose registers could be used by the program for any purpose, EAX is often used as the placeholder for storing the return value of a function.

Submit
9. Which of the following assembly instructions is least likely to be used by malicious code to perform a jump?

Explanation

Malicious code typically uses assembly instructions like JMP, RET, and CALL to perform jumps and alter the flow of execution. However, XOR is least likely to be used for this purpose. XOR is primarily used for bitwise operations and data manipulation, rather than controlling program flow. It is less commonly used for branching or jumping within a program, making it an unlikely choice for malicious code seeking to perform a jump.

Submit
10. Which mechanism is malware least likely to use when defending itself against analysis?

Explanation

Based on the options provided, the correct answer is D. Detecting the presence of a debugger. Malware is least likely to use this mechanism when defending itself against analysis. Detecting the presence of a debugger is a common defensive technique used by malware to evade detection and analysis. However, the other options listed (A. Inserting junk code instructions, B. Employing polarization techniques, and C. Making use of "tricky" jump instructions) are more commonly employed by malware to obfuscate its code and make analysis more difficult.

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Mar 26, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 26, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Jul 21, 2012
    Quiz Created by
    Lenny Zeltser
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following tools best supports the concept of breakpoints?
Which of the following Windows registry keys is most useful for...
Which of the following defensive measures do malware authors use to...
Which of the following system calls is most likely to be used by a...
What are the two most common phases of malware analysis? 
Which of the following terms refers to a field in the PE header that...
In the context of malware analysis, what does the term...
Which x86 register is most commonly used for storing a function's...
Which of the following assembly instructions is least likely to be...
Which mechanism is malware least likely to use when defending...
Alert!

Advertisement