Project 4 ‐ Windows Sandbox - jacobwilliams100/sec-440 GitHub Wiki
Deliverable 1: Screenshot of running Windows Sandbox
Deliverable 2
Configuration File
Ping to google.com (not working)
Shared Directory with Host
Deliverable 3: Proof of my working Run-in-Sandbox
Deliverable 4: Proof of Powershell repo being utilized by my system
Proof of Malware Running in Sandbox
Luckily, the script fails because we are not connected to the internet. If we were, it might be able to send data to an adversary on the internet.
Reflection
I encountered some frustrations with this lab. In particular, the BanterBox Windows-Sandbox utility was challenging to get working. It was hard to get the malware to run in Sandbox because it always got caught by the built-in, un-modifiable Windows Defender. It turns out it needed to be disabled in the configuration file. That said, I enjoyed getting to learn how to use Windows Sandbox. If I was testing malware, I think it would use a conventional VM such as a Windows installation in a VMWare VM, but this is an option that I didn't know about and will probably use in the future.