Apr 27, 2026
BlogSuspicious File Analysis: How to Tell If It's Malicious

A single email attachment can encrypt your entire network before lunch – and most small teams have no idea how to investigate it before it runs.
Suspicious file analysis is the structured process of examining an unknown file to determine whether it is malicious. Analysts inspect metadata, hashes, and strings without executing the file (static analysis), then "detonate" it inside an isolated sandbox (dynamic analysis) to observe its actual behavior – file changes, network calls, registry edits – before extracting indicators of compromise (IOCs) to drive containment.
For small and mid-sized businesses without a dedicated SOC, the difference between a contained alert and a full breach often comes down to one decision: is this file safe, suspicious, or malicious? This guide walks through the analysis steps, the evidence that proves the verdict, and how to scale the workflow without hiring malware analysts.
What Is Suspicious File Analysis?
Suspicious file analysis (often called malware analysis) is the discipline of understanding the behavior and purpose of a suspicious file or URL so security teams can detect, contain, and prevent further damage. The output is twofold: a verdict (clean, suspicious, or malicious) and a set of artifacts – file hashes, IP addresses, domains, registry keys – that can be fed into detection rules.
There are three primary methods, and a complete investigation usually combines them:
- Static analysis examines the file without executing it. Analysts pull strings, file headers, hashes, and embedded resources to look for signs of malicious intent. This is fast and safe, but sophisticated malware can hide runtime behavior that static analysis misses.
- Dynamic analysis executes the file inside a sandbox – an isolated virtual environment – and records every action it takes. This is the "detonation" phase.
- Hybrid analysis combines both, using dynamic results (such as memory artifacts) to feed deeper static inspection. This catches threats that try to evade either method alone.
Why Suspicious File Analysis Matters for Growing Businesses
The stakes have never been higher for under-resourced security teams. The 2025 Verizon Data Breach Investigations Report found ransomware was present in 44% of all breaches and in 88% of breaches affecting small and mid-sized businesses – almost always delivered through a malicious file or weaponized link.
The cost of getting it wrong keeps climbing. According to IBM's Cost of a Data Breach Report, the global average breach cost reached USD 4.88 million in 2024, and organizations took an average of 194 days to identify a breach and another 64 days to contain it. Every hour an unanalyzed file sits on an endpoint is an hour an attacker can use it.
For SMEs, the practical implication is clear: you don't need a research-grade malware lab, but you do need a repeatable analysis workflow that produces evidence quickly.
How Do You Analyze a Suspicious File? A Step-by-Step Workflow
Step 1: Triage and Static Analysis
Before touching the file, gather context. Where did it come from – email, USB, download? What did the user expect it to be? Then begin static collection:
- Compute the file hash (MD5, SHA-1, SHA-256). A hash uniquely fingerprints the file and lets you check it against threat intelligence feeds.
- Check the hash against VirusTotal or a similar reputation service. A high-confidence match from multiple engines is itself strong evidence.
- Inspect strings, headers, and imported functions. Tools like PE Studio can automatically flag aspects of a Windows executable that suggest malicious intent, such as blacklisted strings and suspicious API calls.
- Verify the file type and extension. Disguised files –
Invoice.pdf.exeor a macro-laden.docmposing as a.docx– are classic giveaways.
If static analysis is inconclusive, proceed to detonation.
Step 2: File Detonation in a Sandbox (Dynamic Analysis)
A malware sandbox is an isolated, virtualized environment that lets you safely run a suspicious file and watch what it does. During detonation, the sandbox monitors file system modifications, registry changes, network connections, and process activity to determine whether the file is safe, suspicious, or clearly malicious based on real behavior.
A useful detonation produces a behavioral report covering:
- New files dropped or existing files modified
- Registry keys created or altered
- Outbound network connections (and to which IPs/domains)
- Processes spawned and command-line arguments used
- Persistence mechanisms (scheduled tasks, run keys, services)
This is where most of the strongest evidence comes from. A "clean" PDF that immediately reaches out to a foreign IP and writes itself to %AppData% has revealed itself.
Step 3: IOC Investigation and Correlation
Once the sandbox produces artifacts, the next job is IOC investigation – taking those indicators and answering two questions: Is this a known threat? and Is anything else in our environment talking to it?
Correlate the IOCs against:
- Threat intelligence platforms and OSINT (VirusTotal, MITRE ATT&CK, MalwareBazaar)
- Your EDR and SIEM logs for matching hashes, IPs, or domains across the fleet
- Email gateway logs for other recipients of the same attachment
A single bad file usually has friends. Hunting laterally turns one alert into a full incident scope.
Step 4: Verdict and Response
Based on the accumulated evidence, assign a verdict. If malicious:
- Isolate affected endpoints
- Block the hash, IPs, and domains at the firewall, EDR, and email gateway
- Hunt for lateral movement using the IOCs
- Document everything for compliance and after-action review
Speed matters here. Manual workflows often stretch this entire cycle across days.
What Does "Evidence" Look Like? Signs of a Malicious File
When reviewing static and dynamic output, the following patterns are strong evidence of malicious intent:
- Multiple AV engines flagging the hash on services like VirusTotal
- Mismatched or double extensions (
.docx.exe,.pdf.scr) - Encrypted, obfuscated, or packed code with no legitimate reason to be hidden
- Suspicious imported APIs for process injection, keylogging, or persistence
- Anti-analysis behavior such as VM/sandbox detection or long sleep timers
- Outbound connections to known C2 infrastructure or newly registered domains
- Privilege escalation attempts or modifications to security tools
- Dropped binaries in user-writable locations like
%AppData%or%Temp% - Encrypted file extensions appearing across the disk (a ransomware fingerprint)
No single indicator is conclusive. The verdict comes from how many of these line up.
Manual Analysis vs. Free Tools vs. ShieldNet Defense
Below is a practical comparison of how SMEs typically handle suspicious files – and where each approach falls short.
Capability | Manual / In-House Analyst | Free Public Tools (VirusTotal, Hybrid Analysis) | ShieldNet Defense |
|---|---|---|---|
Static hash & reputation check | Manual lookups, slow | Yes, but public submission risks data leakage | Automated on every endpoint event |
File detonation (dynamic analysis) | Requires building a sandbox lab | Public sandbox; samples become public | Built-in malware sandbox (Pro & Ultimate plans) |
Behavioral & IOC extraction | Hours per sample | Report-style, manual triage | Auto-extracted, correlated across the fleet |
Auto-response (isolate, block, kill) | Manual playbooks | Not available | Autopilot response (Pro & Ultimate) |
Mean time to contain | Industry average ~64 days | Hours to days | |
24/7 expert review | Depends on staffing | None | Cyber Security Engineers support 24/7 (Ultimate) |
Log retention for audit | Self-managed | None | 7 / 30 / 180 days (Basic / Pro / Ultimate) |
How ShieldNet Defense Automates Suspicious File Analysis
ShieldNet Defense was built so that small teams can run an enterprise-grade analysis workflow without an in-house SOC, the platform contains an attack from detection to resolution in under 20 minutes – versus the 24–48 hours typical of traditional security teams.
Mapped to the analysis steps above:
- Step 1 – Static triage: Every endpoint event is checked against AI Defense 24/7 detection, included on every plan (Basic, Pro, Ultimate).
- Step 2 – File detonation: A built-in Malware Sandbox ships with the Pro and Ultimate plans, so suspicious files are detonated automatically – no public submission, no separate sandbox to maintain.
- Step 3 – IOC investigation: Analysis and Investigation capabilities (Pro and Ultimate) correlate behavioral artifacts across the fleet, with 30-day retention on Pro and 180-day retention on Ultimate for audit and compliance review.
- Step 4 – Response: Autopilot response (Pro) and custom playbook automation (Ultimate) isolate hosts, block IOCs, and kill processes without waiting for a human in the loop. Ultimate adds 24/7 Cyber Security Engineers support for cases that need expert review.
The result: a repeatable, evidence-driven analysis workflow that runs in the background while your team focuses on running the business.
FAQs
How do you know if a file is malicious?
A file is judged malicious when multiple lines of evidence agree: AV engines flagging the hash, suspicious static properties (packed code, mismatched extensions), and dynamic behavior such as outbound C2 connections, persistence creation, or unauthorized file encryption. No single signal is enough – the verdict comes from convergence.
What is file detonation?
File detonation is the act of executing a suspicious file inside an isolated sandbox to observe its actual behavior. The sandbox records file changes, registry edits, network traffic, and process activity, producing evidence that signature-based scanners often miss – especially for zero-day or obfuscated malware.
What are the three types of malware analysis?
Static analysis examines the file without running it; dynamic analysis runs the file in a sandbox and observes behavior; hybrid analysis combines both, using runtime data to drive deeper static inspection. Most modern investigations use a hybrid approach.
What are indicators of compromise (IOCs)?
IOCs are forensic artifacts that signal a system has been attacked. Common examples include file hashes, malicious IP addresses and domains, suspicious registry keys, and unusual process names. Once extracted, they are used to hunt across logs and block future occurrences.
Stop guessing whether a file is safe. Start a free ShieldNet Defense trial and put a built-in malware sandbox, autopilot response, and 24/7 AI detection between attackers and your business.
Related Articles

Apr 27, 2026
How to Prevent Insider Threats with Smarter Access Controls
Learn how to prevent insider threats with identity-based access controls, continuous verification, and least-privilege strategies built for SMEs.

Apr 23, 2026
EDR vs MDR: which should an SME choose?
EDR vs MDR for SMEs explained with endpoint detection and response, managed EDR, and MDR vs EDR tradeoffs using an outcome-driven decision matrix by team size and risk.

Apr 23, 2026
SOC automation explained: From alert fatigue to action fast
SOC automation turns alert fatigue into fast action by correlating alerts, applying SOAR basics, and using security orchestration to cut response time.

Protect your business with ShieldNet 360
Get started and learn how ShieldNet 360 can support your business.