Reverse engineering
If the goal of your organization is to fully understand the complete heuristic functionality of a malware payload, then performing static and dynamic analysis on the file will not give you this information. Static analysis tools will provide you with insightful artifacts and some IOCs that can be used to identify, collect, and even assist with determining a file. Dynamic analysis will provide you with information about what happens to the operating system at the beginning of the file's execution, not the full execution behavior of the file. This is where reverse engineering comes into play.
As we mentioned earlier, reverse engineering utilizes a combination of disassembling, debugging, and decompilation to examine the full heuristic functionality of a binary file. It does this by reviewing the interpreted assembly that is produced by the contents of the file. Reverse engineering is a technically complex skill set and has a range of books written about it...