Detecting Malware Through Process Chain Analysis

Updated: For those who missed the webinar, you can watch here or read the transcript

REGISTER TODAY!

Wed, Mar 15, 2017 1:00 PM – 2:00 PM EST

When anyone uses a computer, her actions prompt programs to start other programs, such as the computer’s desktop to start a word processor or web browser. These programs begetting other programs form process chains. Malware deployed through exploits and code injections often has to perform similar tricks, which yield process chains often remarkable as abnormal. Arc4dia’s SNOW detects strange process chains through heuristic and behavioral analysis.

In this webinar:

1. We will present examples of process chains.

2. We will show how process chain analysis reveals normal yet unexpected behaviors of certain software.

3. We will illustrate how malware may yield remarkable process chains that should always raise alerts.

4. We will demonstrate how strange process chains can be inspected using SNOW.

This Webinar is FREE but space is limited, so please REGISTER TODAY!

About the Speaker:

Justin Seitz is a Hunter @Arc4dia, has written books “Black Hat Python” & “Grey Hat Python”, Creator of @Hunchly. Blogging & training #OSINT techniques.

Recorded webinar will be distributed to all REGISTERED after the webinar session.

Previous webinar recordings:

Feb 15, 2017 Looking for Cyber Threats Through Statistical Outliers
Jan 24, 2017 Responding to Cyber Incidents