School of Science and Technology, Faculty of IT, Madan Bhandari Memorial College, Nepal.
International Journal of Science and Research Archive, 2025, 15(03), 582-586
Article DOI: 10.30574/ijsra.2025.15.3.1781
Received on 30 April 2025; revised on 07 June 2025; accepted on 09 June 2025
This research paper investigates the dynamic behavioral analysis of Windows-based Portable Executable (PE) malware samples using sandboxing techniques. The study focuses on comparing various sandboxing methodologies with an emphasis on their ability to detect sophisticated malware behaviors in a controlled environment. In particular, techniques such as the incorporation of realistic user behavior emulation and the integration of machine learning with sandbox environments are examined. The methodology involves deploying agent-based and agent-less sandbox systems to monitor malware execution and capturing system interactions. The results underscore the effectiveness of advanced sandboxing techniques in mitigating evasion tactics deployed by modern malware. Moreover, the paper discusses recent trends that integrate artificial intelligence to further enhance detection accuracy. Overall, the paper asserts that while agent-based approaches generally perform better in terms of comprehensive behavior capture, the evolution in sandboxing designs, notably with user behavior emulation and machine learning integration, significantly improves malware detection outcomes.
Sandbox Analysis; Behavioral Malware Analysis; Windows PE Malware; Dynamic Analysis; User Behavior Emulation; Machine Learning; Malware Evasion; Cybersecurity
Preview Article PDF
Ramesh Prasad Pokhrel. Behavioral analysis of malware using sandboxing techniques. International Journal of Science and Research Archive, 2025, 15(03), 582-586. Article DOI: https://doi.org/10.30574/ijsra.2025.15.3.1781.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







