• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2020
  • November
  • 25
  • Wsb-Detect – Tool To Detect If You Are Running In Windows Sandbox ("WSB")

Wsb-Detect – Tool To Detect If You Are Running In Windows Sandbox ("WSB")

November 25, 2020 Comments Off on Wsb-Detect – Tool To Detect If You Are Running In Windows Sandbox ("WSB")
Wsb-Detect -  Tool To Detect If You Are Running In Windows Sandbox ("WSB") cybersecurity ethical hacking hack android hack app hack wordpress hacker news hacking hacking tools for windows keylogger kit kitploit password brute force penetration testing pentest pentest android pentest linux pentest toolkit pentest tools spy tool kit spyware tools

wsb-detect enables you to detect if you are running in Windows Sandbox (“WSB”). The sandbox is used by Windows Defender for dynamic analysis, and commonly manually by security analysts and alike. At the tail end of 2019, Microsoft introduced a new feature named Windows Sandbox (WSB for short). The techniques used to fingerprint WSB are outlined below, in the techniques section. Feel free to submit a pull request if you have any fingerprinting ideas. I’ve been messing around with it now and then, I will have more on Windows Sandbox coming soon.

Windows Sandbox allows you to quickly, within 15s, create a disposable Hyper-V based Virtual Machine with all of the qualities a familiar VM would have such as clipboard sharing, mapping directories etc. The sandbox is also the underlay for Microsoft Defender Application Guard (WDAG), for dynamic analysis on Hyper-V enabled hosts and can be enabled on any Windows 10 Pro or Enterprise machine. It’s not particularly interesting, but nonetheless could prove useful in implant development. Thank you to my friend Jonas L for guidance when I was exploring the sandbox internals (more to come on this).

Usage

The detect.h header exports all of the functions which can be combined to detect if

#include <stdio.h>
#include "detect.h"

int main(int argc, char** argv)
{
// example vmsmb & username check
if (wsb_detect_dev() || wsb_detect_username())
{
puts("We're in Windows Sandbox!");
return 0;
}

return 1;
}

Techniques

wsb_detect_time

The image for the sandbox seems to be built on Saturday, ‎December ‎7, ‎2019, ‏‎9:14:52 AM – this is around the time Windows Sandbox was released to the public. This check cross references the creation timestamp on the mountmgr driver.

wsb_detect_username

This method will check if the current username is WDAGUtilityUserAccount, the account used by default in the sandbox.

wsb_detect_suffix

This method will use GetAdaptersAddresses, walk over the list of adapters, and compare the DNS suffix to mshome.net – which is used by default in the sandbox.

wsb_detect_dev

Checks if the raw device \.GLOBALROOTdevicevmsmb can be opened, which is used for communication with the host over SMB.

wsb_detect_cmd

On startup, search under the RunOnce key in HKEY_LOCAL_MACHINE for a command which sets the password never to expire.

wsb_detect_office

Checks for the OfficePackagesForWDAG in the current root drive, which seems to be used for Windows Defender Microsoft Office emulation.

wsb_detect_proc

Checks for CExecSvc.exe, which is the container execution service, handling a lot of the heavy lifting.

wsb_detect_genuine

A more generic method when it comes to sandbox detection, however from tests the Windows doesn’t seem to be verified as legitimate in the VMs

Trivia

If you wish to contact me quicker, feel free to contact me on Twitter or e-mail. Also, it’s possible on the host to detect if the sandbox is running, by checking if you can create a mutex named WindowsSandboxMutex. This limits the sandbox to one virtual-machine per host, however, you can release this mutex by simply duplicating the handle and calling ReleaseMutex – viola, you can have multiple instances.

Download Wsb-Detect

Post navigation

Sloth v3.0 releases: shows all open files and sockets in use
Bluetooth Low Energy hardware-less HackMe

Related Articles

safety v1.10.3 releases: checks your installed dependencies for known security vulnerabilities

safety v1.10.3 releases: checks your installed dependencies for known security vulnerabilities

- Hack Tools
January 16, 2021
Ssh-Mitm - Ssh Mitm Server For Security Audits Supporting Public Key Authentication, Session Hijacking And File Manipulation

Ssh-Mitm – Ssh Mitm Server For Security Audits Supporting Public Key Authentication, Session Hijacking And File Manipulation

- Hack Tools
January 16, 2021
shellex: C-shellcode to hex converter

shellex: C-shellcode to hex converter

- Hack Tools
January 15, 2021
hacker gadgets
hacker phone covers

Recent Posts

safety v1.10.3 releases: checks your installed dependencies for known security vulnerabilities

safety v1.10.3 releases: checks your installed dependencies for known security vulnerabilities

January 16, 2021
Ssh-Mitm - Ssh Mitm Server For Security Audits Supporting Public Key Authentication, Session Hijacking And File Manipulation

Ssh-Mitm – Ssh Mitm Server For Security Audits Supporting Public Key Authentication, Session Hijacking And File Manipulation

January 16, 2021
Windows 10 NTFS file system has a vulnerability

Windows 10 NTFS file system has a vulnerability

January 15, 2021
shellex: C-shellcode to hex converter

shellex: C-shellcode to hex converter

January 15, 2021
CVE-2021-3129: Laravel Arbitrary Code Vulnerability Alert

CVE-2021-3129: Laravel Arbitrary Code Vulnerability Alert

January 15, 2021
Stegbrute - Fast Steganography Bruteforce Tool Written In Rust Useful For CTF's

Stegbrute – Fast Steganography Bruteforce Tool Written In Rust Useful For CTF’s

January 15, 2021

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs
ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • Lanc Remastered
  • Privacy Policy
  • Rainmeter Skins
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • Lanc Remastered
  • Privacy Policy
  • Rainmeter Skins
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook
Twitter
Google-plus
Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW