Disclosed herein is a method of analyzing and decrypting encrypted
malicious scripts. The method of the present invention comprises the
steps of classifying a malicious script encryption method into a case
where a decryption function exists in malicious scripts and is an
independent function that is not dependent on external codes such as run
time library, a case where a decryption function exists and is a
dependent function that is dependent on external codes, and a case where
a decryption function does not exist; and if the decryption function
exists in malicious scripts and is the independent function that is not
dependent on the external codes, extracting a call expression and a
function definition for the independent function, executing or emulating
the extracted call expression and function definition for the independent
function, and obtaining a decrypted script by putting a result value
based on the execution or emulation into an original script at which an
original call expression is located. According to the present invention,
unknown malicious codes can be promptly and easily decrypted through only
a single decryption algorithm without any additional data. In addition to
the decryption of encrypted codes, complexity of later code analysis can
also be reduced by substituting constants for all values that can be set
as constants in a relevant script.