This document presents a large-scale study of malware analysis, comparing coarse-grained and fine-grained methodologies to unveil various malicious behaviors and characteristics. It details the dataset used, the processing architecture, and the results of both analysis types, highlighting distinct behaviors, signatures, and techniques employed by malware. The conclusion emphasizes the importance of combining both analytical approaches for a comprehensive understanding of malware threats.