OpenSource For You The Cuckoo methodology 2015-03-10 - The malware analysis process of Cuckoo involves two major components: the host and guest (virtual) machines.