Department of Security and Network Engineering, Innopolis University, Russia.
World Journal of Advanced Research and Reviews, 2025, 28(03), 521-526
Article DOI: 10.30574/wjarr.2025.28.3.4054
Received on 26 October 2025; revised on 05 December 2025; accepted on 08 December 2025
This research investigates dynamic analysis for Android malware detection, addressing the challenges posed by sophisticated, evasive mobile threats. The study employs a controlled Cuckoo Sandbox environment within a Windows-based virtualized environment to reveal malicious runtime behaviors by dynamically executing real malware samples, including WannaCry and CryptoLocker, in isolated virtual machines. Comprehensive behavioral features, such as API usage, system calls, network activity, and file system events, are robustly extracted and analyzed. The approach enables the identification of advanced malicious techniques, including process injection and anti-forensics, which often evade static detection. Despite high detection effectiveness, the study identifies limitations related to sandbox evasion and observation windows. Recommendations are made to enhance runtime simulation and adopt hybrid analysis strategies. The findings provide a practical, scalable framework for Android malware investigation, advancing dynamic analysis accuracy and resilience for operational cybersecurity applications.
Android Malware; Cuckoo Sandbox; Dynamic Analysis; CuckooDroid; Behavioral Detection; Network Security; Cyber Threats
Get Your e Certificate of Publication using below link
Preview Article PDF
Akor Jacob Terungwa. Dynamic Analysis of Android Malware Using Cuckoo Sandbox. World Journal of Advanced Research and Reviews, 2025, 28(03), 521-526. Article DOI: https://doi.org/10.30574/wjarr.2025.28.3.4054.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0