Lädt...

📰 Wsb-Detect - Tool To Detect If You Are Running In Windows Sandbox ("WSB")


Nachrichtenbereich: 📰 IT Security Nachrichten
🔗 Quelle: feedproxy.google.com


wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB"). The sandbox is used by Windows Defender for dynamic analysis, and commonly manually by security analysts and alike. At the tail end of 2019, Microsoft introduced a new feature named Windows Sandbox (WSB for short). The techniques used to fingerprint WSB are outlined below, in the techniques section. Feel free to submit a pull request if you have any fingerprinting ideas. I've been messing around with it now and then, I will have more on Windows Sandbox coming soon.


Windows Sandbox allows you to quickly, within 15s, create a disposable Hyper-V based Virtual Machine with all of the qualities a familiar VM would have such as clipboard sharing, mapping directories etc. The sandbox is also the underlay for Microsoft Defender Application Guard (WDAG), for dynamic analysis on Hyper-V enabled hosts and can be enabled on any Windows 10 Pro or Enterprise machine. It's not particularly interesting, but nonetheless could prove useful in implant development. Thank you to my friend Jonas L for guidance when I was exploring the sandbox internals (more to come on this).


Usage

The detect.h header exports all of the functions which can be combined to detect if

#include <stdio.h>
#include "detect.h"

int main(int argc, char** argv)
{
// example vmsmb & username check
if (wsb_detect_dev() || wsb_detect_username())
{
puts("We're in Windows Sandbox!");
return 0;
}

return 1;
}

Techniques

wsb_detect_time

The image for the sandbox seems to be built on Saturday, ‎December ‎7, ‎2019, ‏‎9:14:52 AM - this is around the time Windows Sandbox was released to the public. This check cross references the creation timestamp on the mountmgr driver.


wsb_detect_username

This method will check if the current username is WDAGUtilityUserAccount, the account used by default in the sandbox.


wsb_detect_suffix

This method will use GetAdaptersAddresses, walk over the list of adapters, and compare the DNS suffix to mshome.net - which is used by default in the sandbox.


wsb_detect_dev

Checks if the raw device \\.\GLOBALROOT\device\vmsmb can be opened, which is used for communication with the host over SMB.


wsb_detect_cmd

On startup, search under the RunOnce key in HKEY_LOCAL_MACHINE for a command which sets the password never to expire.


wsb_detect_office

Checks for the OfficePackagesForWDAG in the current root drive, which seems to be used for Windows Defender Microsoft Office emulation.


wsb_detect_proc

Checks for CExecSvc.exe, which is the container execution service, handling a lot of the heavy lifting.


wsb_detect_genuine

A more generic method when it comes to sandbox detection, however from tests the Windows doesn't seem to be verified as legitimate in the VMs


Trivia

If you wish to contact me quicker, feel free to contact me on Twitter or e-mail. Also, it's possible on the host to detect if the sandbox is running, by checking if you can create a mutex named WindowsSandboxMutex. This limits the sandbox to one virtual-machine per host, however, you can release this mutex by simply duplicating the handle and calling ReleaseMutex - viola, you can have multiple instances.





...

📰 Wsb-Detect - Tool To Detect If You Are Running In Windows Sandbox ("WSB")


📈 72.08 Punkte
📰 IT Security Nachrichten

📰 Windows Sandbox: Nächste Windows-10-Version könnte Sandbox-Modus enthalten


📈 23.75 Punkte
📰 IT Nachrichten

🐧 Running Zoom in a Sandbox: Instructions for Ubuntu (Windows coming soon) (r/Zoom)


📈 20.31 Punkte
🐧 Linux Tipps

🕵️ Hashicorp Nomad/Nomad Enterprise up to 0.12.7 Docker File Sandbox sandbox


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ Apple Safari iFrame Sandbox sandbox [CVE-2019-8771]


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ Apple iOS iFrame Sandbox sandbox [CVE-2019-8771]


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ BigBlueButton up to 2.2 LibreOffice Sandbox bigbluebutton.properties sandbox


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2023-0131 | Google Chrome up to 108.0.5359.124 iFrame Sandbox sandbox


📈 20.17 Punkte
🕵️ Sicherheitslücken

🎥 The Hole in Sandbox: Escape Modern Web-Based App Sandbox From Site-Isolation Perspective


📈 20.17 Punkte
🎥 IT Security Video

🕵️ CVE-2024-23681 | Artemis Java Test Sandbox up to 1.11.1 sandbox (GHSA-98hq-4wmw-98w9)


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2024-23683 | Artemis Java Test Sandbox up to 1.7.5 sandbox


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ Researchers disclose critical sandbox escape bug in vm2 sandbox library


📈 20.17 Punkte
🕵️ Hacking

🕵️ CVE-2023-28178 | Apple macOS up to 13.2.1 Sandbox sandbox (HT213670)


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2022-32881 | Apple macOS Sandbox sandbox (HT213488)


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ Smarty up to 3.1.38 Sandbox Mode $smarty.template_object sandbox


📈 20.17 Punkte
🕵️ Sicherheitslücken

🕵️ Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox


📈 18.53 Punkte
🕵️ Hacking

🐧 Kubernetes locally on Linux, running Elastic on K8s, KFServing &amp; more (Up &amp; Running Weekly #49)


📈 16.88 Punkte
🐧 Linux Tipps

🐧 Ni no Kuni running on RPCS3 on a PS4 running Linux


📈 16.88 Punkte
🐧 Linux Tipps

🔧 Power BI Running Total: How to Calculate Running Totals in Power BI


📈 16.88 Punkte
🔧 Programmierung

🐧 Running Services In Android Developer Options: How To Check Apps Running In Background?


📈 16.88 Punkte
🐧 Linux Tipps

🐧 Running WSL vs Running Linux


📈 16.88 Punkte
🐧 Linux Tipps

🐧 Mycroft AI (open source voice assistant) running perfectly on a PinePhone running Mobian.


📈 16.88 Punkte
🐧 Linux Tipps