Safe sandbox for malware examination

Discussion in 'sandboxing & virtualization' started by rpk2006, Nov 25, 2022.

  1. rpk2006

    rpk2006 Registered Member

    Joined:
    Jan 29, 2003
    Posts:
    114
    Location:
    Planet Earth
    I want to know which sandbox is comparatively safer for malware examination. I want one which is easy to setup Windows environment and safe. Malware should not exploit the network.
     
  2. Acadia

    Acadia Registered Member

    Joined:
    Sep 8, 2002
    Posts:
    4,332
    Location:
    US
    If I am not mistaken, most experts who really know what they're doing, use Virtual Machines to do that kind of stuff.
    Acadia
     
  3. Buddel

    Buddel Registered Member

    Joined:
    Apr 28, 2015
    Posts:
    1,942
    This is a good point: "experts who really know what they're doing". Consequently, you should refrain from examining malware samples and leave it to the experts.
     
  4. Acadia

    Acadia Registered Member

    Joined:
    Sep 8, 2002
    Posts:
    4,332
    Location:
    US
    Now that I think about it, I believe most experts actually try to use another pc altogether, a second physical computer, disconnected from everything else. A Virtual Machine is only used if they have no choice, they only have one pc.
    Acadia
     
  5. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    For a rigorous examination of malware any sandbox really won't do at all. For example, malware run in SBIE will indeed keep the system safe but will yield little (if any) data on what the malware is doing. Comodo Containment would be better- the real system will also be protected, but only gross changes would be seen in the Containment (VTRoot) directory. Of the two Comod would also be preferable in that there is a much more Blocking and alerting for anything trying to connect out robust (essential for data stealers).

    As was mentioned above a VM is preferable but one also must be cognizant that some malware will be VM aware and thus won't be able to run at its full capability (if at all). Also some malware will be able to differentiate between systems set up as plain analysis machines versus a real system. To analyze malware such as these one would need a dedicated sacrificial system.

    But best practice for beginner is to start using an online sandbox which may already provide explanations.
     
    Last edited: Nov 25, 2022
  6. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,616
    Location:
    Milan and Seoul
    Shadow Defender can also be used to test malware behaviour, it is not a sandbox but a virtual system, and as far as I know it hasn't been bypassed by anything (tested under extreme conditions by our late moderator Peter2150 a real expert).
     
  7. rpk2006

    rpk2006 Registered Member

    Joined:
    Jan 29, 2003
    Posts:
    114
    Location:
    Planet Earth
    Cloud-based sandbox would be the best option. Checked a few.
     
  8. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    Actually this would be a very, very bad idea. Although SD will certainly roll back any changes made by malware (such as ransomware) , it will not prevent either the harvesting or transmission of data collected by data miners (such as keyloggers, password stealers, etc).

    So although fine on a test system in a VM, it should be understood that as any sort of anti-malware app on the real system it is Double Plus Ungood.
     
  9. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,616
    Location:
    Milan and Seoul
    You are certainly right, SD can't stop data harvesting, I guess that testing malware in a computer having sensitive data would also be to say the least irresponsible. I personally don't keep anything financially compromising on my machine, and never ever test malware...
     
  10. rpk2006

    rpk2006 Registered Member

    Joined:
    Jan 29, 2003
    Posts:
    114
    Location:
    Planet Earth
    Just want to know views on this:

    I have created Windows Hyper-V virtual machine. In that VM, I have installed Sandboxie-Plus.

    To test any sample in VM, I follow these steps:
    1. Disable network in VM
    2. Select "Run" from "Sandboxie" and browse to the path of malware
    3. Execute it.
    Is it safe or still has loopholes to get my primary local machine getting infected ?
     
  11. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,918
    i keep it simple: you are not able to examine malware. no kind of basics, no kind of anything around malware. i remember you about your compromised windows, that issue is still not resolved. while you are heading towards dead ends. malware research simply need another kind of understanding and tools like a generic and stu4pid antivirus (suite or endpoint).

    #edit

    hint: malware is aware if it is run in a sandbox, thus it behave "normal"

    keep with https://any.run/ if you want to gather knowledge about results. for you, and ofc me too, we only can recognize results of malware - if we know about the results. for real examining it need a lot more, in special knowledge about programming - different kind of programming languages, api knowledge and much more.

    any.run is also only top of an iceberg, its just examining processes in a honey trap.
     
    Last edited: Nov 28, 2022
  12. rpk2006

    rpk2006 Registered Member

    Joined:
    Jan 29, 2003
    Posts:
    114
    Location:
    Planet Earth
    What you remember but missed is that the system was not compromised. That is an isolated environment and G Data intercepted it.

    Not all malware are written with Sandbox in mind. Have been testing few in isolated environment, these behaved in Sandbox as malware itself. But you are right, many are aware of sandbox and even check the Antivirus installed before executing. Any.run I am aware of but was using Joe Sandbox.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.