Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

FOR610Digital Forensics and Incident Response
  • 6 Days (Instructor-Led)
  • 36 Hours (Self-Paced)
Course created by:
Lenny ZeltserAnuj Soni
Lenny Zeltser & Anuj Soni
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Course created by:
Lenny ZeltserAnuj Soni
Lenny Zeltser & Anuj Soni
  • GIAC Reverse Engineering Malware (GREM)
  • 36 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 48 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Explore malware analysis tools and techniques in depth and acquire the practical skills to examine malicious programs that target and infect Windows systems.

Course Overview

FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques equips students with hands-on skills to analyze malware targeting Windows systems. Through labs and Capture-the-Flag challenges, students use advanced tools to uncover malware capabilities, analyze obfuscation techniques, and address common threats. This malware analysis course is ideal for those seeking to enhance threat intelligence, incident response, and enterprise defenses.

What You’ll Learn

  • Set up a secure lab to analyze malware behavior
  • Use monitoring tools to observe interactions with Windows systems
  • Analyze obfuscated scripts and executables
  • Control malware through network interception and code patching
  • Investigate internals using disassemblers and debuggers
  • Identify assembly-level patterns like code injection and anti-analysis tactics
  • Extract IOCs and assess threats from malicious files

Business Takeaways

  • Enable teams to perform in-house malware analysis, reducing reliance on external resources
  • Expand analysis capabilities to provide greater value to internal or external stakeholders
  • Increase efficiency in delivering actionable insights and analysis results
  • Minimize incident scope and cost with faster response times to security threats

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in FOR610™: Hacker Tools, Techniques, and Incident Handling™.

Section 1Malware Analysis Fundamentals

Section 1 introduces essential malware analysis techniques, covering static, behavioral, and code analysis to understand malware interactions and inner workings. Students will set up a flexible lab environment, using Windows and REMnux virtual machines, to conduct these analyses effectively and with instructor guidance.

Topics covered

  • Assembling a toolkit for effective malware analysis
  • Examining static properties of suspicious programs
  • Performing behavioral analysis of malicious Windows executables
  • Performing dynamic code analysis of malicious Windows executables
  • Exploring network interactions of malware in a lab for additional characteristics 

Labs

  • Setting up and using your lab for behavioral analysis
  • Intercepting and examining malicious network traffic
  • Decoding malicious artifacts using dynamic analysis
  • Debugging malware using x64dbg
  • Understanding command-and-control (C2)

Section 2Reversing Malicious Code

Section two dives into assembly-level analysis of Windows executables, teaching key x86 and x64 concepts for malware analysis using tools like Ghidra. Students will learn to interpret disassembled code, follow control flow, and identify common malware characteristics, such as command and control, through hands-on exercises.

Topics covered

  • Understanding core x86 assembly concepts for malicious code analysis
  • Identifying key assembly constructs with a disassembler
  • Following program control flow to understand decision points
  • Recognizing common malware characteristics at the Windows API level
  • Extending assembly knowledge to include x64 code analysis 

Labs

  • Static analysis of malicious code using Ghidra
  • Analysis of common assembly-level patterns
  • Examining API interactions at the assembly level
  • 64-bit assembly code peculiarities

Section 3Analyzing Malicious Documents and Scripts

Section 3 covers the analysis of malicious documents and scripts, teaching techniques for examining PDFs, VBA macros in Office files, RTF documents, and deobfuscating JavaScript. Students will learn to identify threats, extract indicators of compromise (IOCs), and understand shellcode capabilities within these file types.

Topics covered

  • Malicious PDF file analysis
  • The analysis of suspicious websites
  • VBA macros in Microsoft Office documents
  • Examining malicious RTF files
  • Understanding shellcode

Labs

  • Examining suspicious PDF documents
  • Investigating malicious websites
  • Analyzing VBA macros in Microsoft Office documents
  • Examining shellcode artifacts
  • Deobfuscating JavaScript and PowerShell

Section 4In-Depth Malware Analysis

Section 4 delves into advanced techniques for malware analysis, focusing on unpacking, deobfuscating, and analyzing multi-technology malware, including .NET and "fileless" threats. Students will learn to identify packers, handle code injection methods, and examine obfuscated JavaScript, PowerShell, and shellcode.

Topics covered

  • Recognizing packed Windows malware
  • Getting started with unpacking
  • Using debuggers for dumping packed malware from memory
  • Analyzing multi-technology and "fileless" malware
  • Analyzing .NET malware

Labs

  • Getting started with unpacking
  • Dumping packed malware from memory
  • Debugging packed malware
  • Analyzing fileless malware
  • Unpacking and decoding .NET assemblies

Section 5Examining Self-Defending Malware

Section 5 covers anti-analysis techniques used by malware authors, teaching students to identify and bypass evasion tactics, unpack malware employing process hollowing, and handle code misdirection. This section integrates and expands previous techniques, with hands-on exercises to reinforce skills in analyzing resistant malware.

Topics covered

  • How malware detects debuggers and protects embedded data
  • Unpacking malicious software that employs process hollowing
  • Bypassing the attempts by malware to detect and evade analysis tools 
  • Handling code misdirection techniques, including SEH and TLS callbacks 
  • Unpacking malicious executables by anticipating the packer's actions 

Labs

  • Patching malware to bypass anti-analysis measures
  • Deobfuscating embedded strings
  • Examining sandbox evasion capabilities of malware
  • Unpacking a variety of malware samples

Section 6Malware Analysis Tournament

Section 6 consolidates malware analysis skills through a capture-the-flag tournament, offering practical challenges with real-world malware. This hands-on experience reinforces key techniques in static and dynamic analysis, unpacking, and examining self-defending malware.

Topics covered

  • Malware analysis fundamentals
  • Reversing malicious code using static and dynamic techniques
  • Analyzing malicious documents
  • In-depth malware analysis, including unpacking
  • Examining self-defending malware 

Things You Need To Know

Relevant Job Roles

Threat Hunter

Digital Forensics and Incident Response

This expert applies new threat intelligence against existing evidence to identify attackers that have slipped through real-time detection mechanisms. The practice of threat hunting requires several skill sets, including threat intelligence, system and network forensics, and investigative development processes. This role transitions incident response from a purely reactive investigative process to a proactive one, uncovering adversaries or their footprints based on developing intelligence.

Explore learning path

Forensics Analyst (DCWF 211)

DoD 8140: Cyber Enablers

Investigates cybercrimes, analyzing digital media and logs to establish documentary or physical evidence in support of cyber intrusion cases.

Explore learning path

Malware Analyst

Digital Forensics and Incident Response

Malware analysts face attackers’ capabilities head-on, ensuring the fastest and most effective response to and containment of a cyber-attack. You look deep inside malicious software to understand the nature of the threat – how it got in, what flaw it exploited, and what it has done, is trying to do, or has the potential to achieve.

Explore learning path

Insider Threat Analysis

NICE: Protection and Defense

Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.

Explore learning path

Digital Forensics (OPM 212)

NICE: Protection and Defense

Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.

Explore learning path

Military Operations / Law Enforcement Agents

Digital Forensics and Incident Response

Execute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.

Explore learning path

Incident Response Team Member

Digital Forensics and Incident Response

This dynamic and fast-paced role involves identifying, mitigating, and eradicating attackers while their operations are still unfolding.

Explore learning path

Cyber Defense Forensics Analyst (DCWF 212)

DoD 8140: Cybersecurity

Analyzes digital evidence to investigate computer security incidents and support mitigation of vulnerabilities and ongoing threat response.

Explore learning path

Cybersecurity Analyst / Engineer

Cyber Defense

As this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.

Explore learning path

Incident Response (OPM 531)

NICE: Protection and Defense

Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

Explore learning path

Digital Evidence Analysis (OPM 211)

NICE: Investigation

Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Lenny Zeltser
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Singapore, SG & Virtual (live)

    Instructed by Xavier Mertens
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,900 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Jess Garcia
    Date & Time
    Fetching schedule..View event details
    Course price
    £7,160 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Lenny Zeltser
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Salt Lake City, UT, US & Virtual (live)

    Instructed by Evan Dygert
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by Michael Murr
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Prague, CZ & Virtual (live)

    Instructed by Lenny Zeltser
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,230 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Xavier Mertens
    Date & Time
    Fetching schedule..View event details
    Course price
    £7,160 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
Showing 8 of 18

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources