- Upload the suspicious file to VirusTotal.
- Detect and monitor the changes made by isolating execution using Sandboxie.
- Analyzing malware and tracing of all system calls with CWSandbox.
- Obtain an automated threat analysis design with ThreatExpert.
- Analyzing suspicious network traffic with Anubis.
- Analyzing PDF, flash, and JavaScript with Wepawet.
- Examine multiple aspects of a PE using MANDIANT Red Curtain.
Reference: