Skip to content
All Docs

Malware Lab 19-Track Reference

Malware Lab 19-Track Reference#

Malware Lab automatically dispatches each upload to the right analysis track based on file format. The average sample finishes in roughly 90 seconds, and every track shares a common report shell with MITRE ATT&CK mapping, YARA matches, and an AI-generated natural-language summary.

Track Catalogue#

#TrackInput FormatPrimary EnginesReport Highlights
1PE.exe, .dll, .sysGhidra (decompile) + CAPA + Speakeasy (emulation) + YARAFunction graph, CAPA capabilities, IOCs, MITRE mapping
2APKAndroid .apkMobSF + YARA + manifest static analysisPermission risk, suspicious API calls, certificate info
3IPAiOS .ipaMobSF + YARA + code-signature checksEntitlement audit, URL schemes, asset-theft patterns
4Office (DOCX/XLSX/PPTX)OOXML packagesolevba + YARA + macro extractorVBA source, AutoOpen/AutoExec triggers, embedded IOCs
5HWP / HWPXKorean HWP and HWPXolevba + Korean-specific extractorsEmbedded OLE objects, macros, outbound calls
6PDF.pdfPDF.js emulation + YARA + JavaScript tracerOpenAction handlers, hidden objects, JS-based IOCs
7ELFLinux executablesQiling (user-mode emulation) + CAPA + YARASystem-call trace, capabilities, packer detection
8Mach-OmacOS executablesQiling + YARA + signature verificationEntitlements, dynamic libraries, injection traces
9.NETCLR assembliesdnfile + Ghidra + YARAIL decompilation, obfuscation detection, call graph
10JARJava archivesCFR/Procyon decompilation + YARAClass tree, manifest, third-party library calls
11JavaScript.js, .mjsSandbox emulation + AST analysisDOM access, eval/Function usage, external calls
12PowerShell.ps1Sandbox + AMSI tracer + deobfuscatorCommand tree, download URLs, encoded payloads
13VBS·HTA.vbs, .htaSandbox emulation + script static analysisDownloader patterns, command execution, registry edits
14OneNote.one, .onepkgOneNote parser + attachment extractorEmbedded payloads, external links, macros
15EML·MSGEmail messagesEML/MSG parser + attachment splitterHeader analysis, sender authentication, recursive attachment scan
16MSI·MSIX·APPXWindows installersMSI table parser + payload extractor + YARACustomAction list, post-install commands, signature info
17LNKWindows shortcutsLNK parser + command-line decoderTarget command, encoded args, icon source
18WebAssembly.wasmWasm decompilation + YARAImport/export functions, suspicious calls, static strings
19Browser Extension.crx, .xpiManifest analysis + content-script extractor + YARAPermission scope, outbound calls, code-injection patterns

Common Report Sections#

Regardless of track, every report includes:

  • Threat verdict: clean / suspicious / malicious.
  • MITRE ATT&CK mapping across all 14 tactic phases (Reconnaissance to Impact).
  • IOCs: domains, IPs, hashes, mutexes, file paths.
  • YARA matches from public rule sets plus unJaena-authored rules.
  • AI summary in Korean, English, and Japanese.

Average Analysis Time#

Most samples complete within 90 seconds. Heavy stages — PE unpacking, full Ghidra decompilation, sandbox traces — can extend the run to about five minutes; the UI progress bar shows current stage and remaining work.

Next Steps#