The rhythm of execution: unveiling the impact of sandbox execution time on cyber threat intelligence data
Xuguo WANG , Diming ZHANG , Chenglin LI , Xuan JIANG , Ligeng CHEN
Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (4) : 2004807
The rhythm of execution: unveiling the impact of sandbox execution time on cyber threat intelligence data
As malware techniques evolve, threat actors continuously refine their code with evasion and anti-analysis strategies, making sandbox-based cyber threat intelligence (CTI) data collection essential for analyzing malicious behaviors. However, no prior research has systematically examined the relationship between execution time and intelligence data completeness, nor its impact on intelligence data fidelity. Existing sandbox configurations typically rely on predefined execution time thresholds without empirical justification, potentially leading to premature termination of critical behaviors or excessive computational overhead. To address this gap, we analyze malware execution dynamics through system calls, code execution, and data entry access patterns mapped within the MITRE ATT&CK framework. Leveraging Extreme Value Theory (EVT), we model the probabilistic distribution of intelligence data extraction over time, enabling us to estimate the likelihood of acquiring additional intelligence data as execution progresses. Our analysis reveals that the probability of obtaining new intelligence data decreases with time. Specifically, at a 95% confidence level, the probability of acquiring additional intelligence data after three minutes is 0.092, and after five minutes is 0.074, indicating a diminishing rate of intelligence extraction over extended execution periods. These findings indicate that extending execution time beyond a specific threshold provides limited additional intelligence data, highlighting the importance of determining an optimal execution time. By introducing an empirical framework for optimizing sandbox execution time in intelligence data extraction, we introduce a quantitative and principled execution model, providing a scientifically grounded methodology for malware analysis. Our findings provide a foundation for future research in adaptive threat intelligence data collection, enabling a data-driven approach to execution time selection in large-scale security operations.
cyber threat intelligence / execution time / sandbox / malware behavior / MITRE ATT&CK
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
Nawrocki M, Kristoff J, Hiesgen R, Kanich C, Schmidt T C, Wählisch M. Sok: a data-driven view on methods to detect reflective amplification DDoS attacks using honeypots. In: Proceedings of the 8th IEEE European Symposium on Security and Privacy (EuroS&P). 2023, 576−591 |
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
Zhao J, Yan Q, Liu X, Li B, Zuo G. Cyber threat intelligence modeling based on heterogeneous graph convolutional network. In: Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses. 2020, 241−256 |
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
Jamalpur S, Navya Y S, Raja P, Tagore G, G.Rama, Rao K. Dynamic malware analysis using cuckoo sandbox. In: Proceedings of the 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT). 2018, 1056–1060 |
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
Brengel M, Rossow C. MEMSCRIMPER: time- and space-efficient storage of malware sandbox memory dumps. In: Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2018, 24−45 |
| [36] |
Fan C I, Hsiao H W, Chou C H, Tseng Y F. Malware detection systems based on API log data mining. In: Proceedings of the 39th IEEE Annual Computer Software and Applications Conference. 2015, 255−260 |
| [37] |
Kim D, Mirsky D, Majlesi-Kupaei A, Barua R. A hybrid static tool to increase the usability and scalability of dynamic detection of malware. In: Proceedings of the13th International Conference on Malicious and Unwanted Software (MALWARE). 2018, 115−123 |
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
| [43] |
Cole Y, Zhang H, Ge L, Wei S, Yu W, Lu C, Chen G, Shen D, Blasch E, Pham K D. ScanMe mobile: a local and cloud hybrid service for analyzing APKs. In: Proceedings of 2015 Conference on Research in Adaptive and Convergent Systems. 2015, 268−273 |
| [44] |
|
| [45] |
Morales J, Xu S, Sandhu R. Analyzing malware detection efficiency with multiple anti-malware programs. ASE Science Journal, 2012, 1(2): 56–66 |
| [46] |
|
| [47] |
|
| [48] |
Teller T, Hayon A. Enhancing automated malware analysis machines with memory analysis. See blackhat.com/docs/us-14/materials/arsenal/ us-14-Teller-Automated-Memory-Analysis-WP.pdf website, 2014 |
| [49] |
|
| [50] |
|
| [51] |
|
| [52] |
|
| [53] |
|
| [54] |
|
| [55] |
|
| [56] |
|
| [57] |
Polino M, Continella A, Mariani S, D’Alessio S, Fontana L, Gritti F, Zanero S. Measuring and defeating anti-instrumentation-equipped malware. In: Proceedings of the 14th International Conference on Detection of intrusions and malware, and vulnerability assessment. 2017, 73−96 |
| [58] |
|
| [59] |
Wüchner T, Ochoa M, Pretschner A. Robust and effective malware detection through quantitative data flow graph metrics. In: Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2015, 98−118 |
| [60] |
|
| [61] |
|
| [62] |
|
| [63] |
|
| [64] |
Fleck D, Tokhtabayev A, Alarif A, Stavrou A, Nykodym T. PyTrigger: a system to trigger & extract user-activated malware behavior. In: Proceedings of 2013 International Conference on Availability, Reliability and Security. 2013, 92−101 |
| [65] |
|
| [66] |
|
| [67] |
|
| [68] |
Bayer U, Kirda E, Kruegel C. Improving the efficiency of dynamic malware analysis. In: Proceedings of 2010 ACM Symposium on Applied Computing. 2010, 1871−1878 |
| [69] |
|
| [70] |
Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio C A. Spotting the malicious moment: characterizing malware behavior using dynamic features. In: Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES). 2016, 372−381 |
| [71] |
Milosevic J, Ferrante A, Malek M. What does the memory say? towards the most indicative features for efficient malware detection. In: Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). 2016, 759−764 |
| [72] |
Severi G, Leek T, Dolan-Gavitt B. MALREC: compact full-trace malware recording for retrospective deep analysis. In: Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2018, 3−23 |
| [73] |
|
| [74] |
Abdelsalam M, Krishnan R, Huang Y, Sandhu R. Malware detection in cloud infrastructures using convolutional neural networks. In: Proceedings of the 11th IEEE International Conference on Cloud Computing (CLOUD). 2018, 162−169 |
| [75] |
Rossow C, Dietrich C J, Bos H, Cavallaro L, van Steen M, Freiling F C, Pohlmann N. Sandnet: network traffic analysis of malicious software. In: Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 2011, 78−88 |
| [76] |
|
| [77] |
|
| [78] |
Kaur N, Bindal A K, PhD A. A complete dynamic malware analysis. International Journal of Computer Applications, 2016, 135(4): 20–25 |
| [79] |
Koupaei A N A, Nazarov A N. Security analysis threats attacks mitigations and its impact on the internet of things (iot). Synchroinfo Journal, 2020, 6(4): 36–41 |
| [80] |
Le D T, Dinh D T, Nguyen Q L T, Tran L T. A basic malware analysis process based on fireeye ecosystem. Webology, 2022 |
| [81] |
|
| [82] |
|
| [83] |
|
| [84] |
|
| [85] |
|
| [86] |
|
| [87] |
Pék G, Bencsáth B, Buttyán L. nEther: in-guest detection of out-of-the-guest malware analyzers. In: Proceedings of the 4th European Workshop on System Security. 2011, 3 |
| [88] |
Raffetseder T, Kruegel C, Kirda E. Detecting system emulators. In: Proceedings of the 10th International Conference on Information Security. 2007, 1−18 |
| [89] |
|
| [90] |
Yokoyama A, Ishii K, Tanabe R, Papa Y, Yoshioka K, Matsumoto T, Kasama T, Inoue D, Brengel M, Backes M, Rossow C. SandPrint: fingerprinting malware sandboxes to provide intelligence for sandbox evasion. In: Proceedings of the 19th International Symposium on Research in Attacks, Intrusions, and Defenses. 2016, 165−187 |
| [91] |
|
| [92] |
Lindorfer M, Kolbitsch C, Comparetti P M. Detecting environment- sensitive malware. In: Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection. 2011, 338−357 |
| [93] |
|
| [94] |
|
| [95] |
|
| [96] |
|
| [97] |
|
| [98] |
|
| [99] |
|
| [100] |
Ugarte-Pedrero X, Balzarotti D, Santos I, Bringas P G. RAMBO: run-time packer analysis with multiple branch observation. In: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2016, 186−206 |
| [101] |
|
| [102] |
|
| [103] |
|
| [104] |
|
| [105] |
Ahmed S, Xiao Y, Snow K Z, Tan G, Monrose F, Yao D D. Methodologies for quantifying (re-)randomization security and timing under JIT-ROP. In: Proceedings of 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020, 1803−1820 |
| [106] |
|
| [107] |
|
| [108] |
|
| [109] |
|
| [110] |
|
| [111] |
|
| [112] |
|
| [113] |
|
| [114] |
|
| [115] |
|
| [116] |
|
| [117] |
|
| [118] |
|
| [119] |
Wueest C. Does malware still detect virtual machines? See community.broadcom.com/symantecenterprise/ viewdocument/does-malware-still-detect-virtual-m? CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68& tab=librarydocuments website, 2014 |
Higher Education Press
/
| 〈 |
|
〉 |