This project aims to automatically configure a Windows Sanbox for malware analysis with offline software packages.
Make sure you have Windows Sandbox enabled.
Customize packages.json if you need to remove or add packages.
- Run
download_pkgs.ps1to download all packages for offline use, and update the checksums for later verification. - Start
start.wsb. - Generally it should be done in 2 minutes.
- Put malware samples in
./MALWAREand you will find it on desktop. - Try with the provided sample, password is
infected(from VX Underground).
Note:
- Use
start.wsbwhenever possible - If Internet is needed, use
danger_zone_start_with_internet.wsb, ideally in an isolated physical network - If you just need to capture some network traffic without the need of Internet connectivity, the default
start.wsbshould be sufficient, just capture traffic on the TUN device
