Malware & Hackers Evade Antivirus with Windows Sandbox

Malware & Hackers Evade Antivirus with Windows Sandbox

This video explores how advanced threat actors utilize Windows Sandbox for malicious activities, highlighting its capabilities for evading detection and executing malware. It emphasizes the importance for cybersecurity professionals to understand these techniques. #Mirrorface #LilimRat

Keypoints :

  • Windows Sandbox is a virtual, isolated environment for testing files and malware safely on Windows 10 and 11.
  • Malicious actors like the Mirrorface threat group use Windows Sandbox with tools like Lilith Rat for undetectable malware deployment.
  • Sandbox configuration files (WSB/XML) can control aspects like network, shared folders, and commands run at startup, enabling stealthy operations.
  • Threat actors exploit the sandbox’s lack of antivirus coverage and logging to execute persistent, covert malware campaigns.
  • Using command-line tools like WSB.exe, attackers can start, manage, and automate sandbox instances without user interaction.
  • Shared folders and clipboard functions can be manipulated for exfiltration, staging, and transferring malicious payloads in and out of the sandbox.
  • Detection involves monitoring sandbox-related processes and artifacts, but threat actors may use techniques to hide activity from defenders.