Question 1
What is the main goal of dynamic malware analysis?
To understand malware logic by decompiling it
To identify file hashes before execution
To extract readable strings from the binary
To observe malware behavior during execution in a controlled environment
Question 2
Which tool provides real-time monitoring of system and registry events when executing a malware sample?
Process Monitor
PEview
Resource Hacker
Strings
Question 3
You execute a malware sample in a sandbox and see multiple processes like svchost.exe and cmd.exe. Which tool helps visualize parent-child process relationships?
Process Explorer
Process Hacker
RegShot
Autoruns
Question 4
If malware modifies registry entries to start automatically after reboot, which tool can confirm this by comparing snapshots?
RegShot
Process Monitor
PE Studio
BinText
Question 5
While analyzing with Process Monitor, you observe frequent WriteFile operations to .tmp files in %AppData%. What might this indicate?
Temporary installation logs
Legitimate Windows caching
Antivirus quarantine files
Data staging for exfiltration or payload unpacking
Question 6
A malware process creates a registry key under HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe. What does this suggest?
Keylogging activity
Network connection setup
Persistence mechanism
DLL injection attempt
Question 7
During analysis, a process is seen injecting code into another process. Which Windows API call might indicate this?
CreateRemoteThread()
GetModuleHandle()
RegOpenKeyEx()
CopyFileA()
Question 8
Which precaution should always be taken before performing dynamic malware analysis?
Enable internet access for realistic testing
Disable antivirus for execution freedom
Run the sample in an isolated sandboxed VM
Use your main system for faster performance
Question 9
In Process Monitor, which filter best helps identify registry persistence attempts?
Operation = “RegSetValue”
Operation = “CreateFile”
Path = “\Temp\”
Result = “SUCCESS”
Question 10
Why is RegShot used after running a malware sample for a short period?
To verify antivirus response
To detect registry or file system changes caused by malware
To monitor network connections
To extract metadata and version info
There are 10 questions to complete.