Introduction to Sysinternals Tools for Malware Analysis


We start by introducing the Sysinternals Suite,originally developed by Microsoft for system troubleshooting, which has become a staple for manual malware investigators. Users can either download the full suite or individual tools based on their investigation needs.

Signature Check: Pinpointing Unsigned Executables

Signature Check (Sigcheck) is used to find unsigned executables within a system. Since many malware files lack legitimate digital signatures, this tool helps investigators flag potentially suspicious files. However, being unsigned doesn’t inherently mean a file is malicious—it’s merely a prompt for deeper analysis. The tool can also submit file hashes to VirusTotal for crowdsourced detection results.

TCPView: Uncovering Network Communications

TCPView provides a real-time snapshot of all network activity. Malware often communicates with external servers—whether to exfiltrate data or receive commands. TCPView helps analysts identify processes making unusual connections, especially those to unknown remote IP addresses. Analysts are encouraged to perform WHOIS lookups to trace these connections.

Process Explorer: Task Manager on Steroids

Process Explorer displays hierarchical relationships between processes, enabling users to examine parent-child chains and validate process legitimacy. Suspicious processes often lack verified publishers. The tool integrates with VirusTotal to highlight any known malware. Signature verification and command-line arguments are key indicators in determining whether a process is benign or harmful.

Process Monitor: In-Depth Real-Time Event Logging

Process Monitor logs every action taken by running processes, including file system reads/writes and registry operations. While the sheer volume of data can be overwhelming, the tool’s powerful filters allow investigators to isolate activities tied to specific processes, operations (e.g., “create file”), or behaviors (e.g., registry edits).

Strings: Extracting Indicators of Compromise

Strings is used to scan executable files for human-readable text. Analysts look for data like IP addresses, URLs, Bitcoin wallet addresses, or suspicious file names—clues that help confirm malicious intent. It’s especially useful when dealing with obfuscated malware that embeds clues in code strings.

Autoruns: Exploring Boot and Logon Persistence

Autoruns shows everything that executes at startup or login, including scheduled tasks and services. It is highly effective in detecting persistence mechanisms—common in sophisticated malware. The instructor demonstrates how to filter out Microsoft-signed entries, making it easier to spot third-party or unauthorized programs. VirusTotal integration helps validate whether any autostart entry is a known threat.

Setup Tips for Effective Tool Use

The video also demonstrates how to configure the tools for efficiency. For example, setting environment variables enables easier command-line access. Instructions are given for resizing terminal fonts for clarity, and enabling VirusTotal API checks in Process Explorer and Autoruns.

Synthesizing Data for Malware Attribution

The real strength of this workflow lies in correlation. By combining insights from all six tools, analysts can spot patterns—such as an unsigned executable communicating with a shady IP, creating unauthorized registry keys, and appearing in autoruns. Together, these signs build a strong case for identifying and removing malware.

Insights Based on Numbers

  • 74 VirusTotal Engines: Files are scanned across this massive database to check reputation and potential threats.
  • 17/74 Detections: Some legitimate tools get flagged by a few engines; thresholding is important to avoid false positives.
  • 6 Core Tools: Each serves a specific niche—networking, file analysis, process monitoring—that, when combined, form a holistic malware detection strategy.

Room Answers

When did Microsoft acquire the Sysinternals tools?
 
What is the last tool listed within the Sysinternals Suite?
 
What service needs to be enabled on the local host to interact with live.sysinternals.com?
 
There is a txt file on the desktop named file.txt. What is the text within the ADS?
 
Using WHOIS tools, what is the ISP/Organization for the remote address in the screenshots above?
 

What entry was updated?

 

What is the updated value?

 
Run the Strings tool on ZoomIt.exe. What is the full path to the .pdb file?
 

Video Walk-through

 

 

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles