Detecting Changes to System Configurations

CYBRScore
Cyberscore

In this lab, you have been assigned to look at a suspicious file on a machine that has been set aside just for malicious software analysis. You will be tasked with (1) Running Regshot, TCPView, ListDLLs, Process Explorer and Process Monitor to create a system baseline and (2) Executing the suspicious file to determine if it is malicious or not.

Time
45 minutes
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you have been assigned to look at a suspicious file on a machine that has been set aside just for malicious software analysis. You will be tasked with (1) Running Regshot, TCPView, ListDLLs, Process Explorer and Process Monitor to create a system baseline and (2) Executing the suspicious file to determine if it is malicious or not.