Here is a quick and interesting 'What's your malware analysis process' quiz that is designed to assess your malware analysis skills and help you learn something new in the process. Do you know everything about malware analysis? There are chances that your malware and reverse-engineering skills might need a tune-up. Take this quiz and see how well you can score on this test. Don't worry, this quiz consists of easy questions that'll keep you engaged and help you revise your skills as well. So, get ready to test your brain skills. All the best!
Debugger
Disassembler
Sniffer
Logger
ECX
EIP
EAX
EFLAGS
Installing software updates that address vulnerabilities in installed software.
Setting memory breakpoints by modifying access flags on memory segments.
Stepping through the executable without running every instruction within function calls.
Modifying a compiled executable to change its functionality without having to recompile it.
JMP
XOR
RET
CALL
Inserting junk code instructions
Employing polarization techniques
Making use of "tricky" jump instructions
Detecting the presence of a debugger
Employing fast-flux DNS techniques
Embedding an imports table in the malicious executable
Targeting client-side vulnerabilities
Packing the malicious executable
Starting Point
Point of Origin
Entry Point
Thread Origination Point
GetProcAddress
VirtualAllocEx
POP
GetAsyncKeyState
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\SECURITY
%UserProfile%\ntuser.dat
HKCU\System\CurrentControlSet\Control\MediaProperties
Behavioral and code analysis
Identification and containment analysis
Registry and file system analysis
User and kernel mode analysis