In-house Sandboxes - behavioural analysis products
VirusTotal detonates files in virtual controlled environments to trace their activities and communications, producing detailed reports including opened, created and written files, created mutexes, registry keys set, contacted domains, URL lookups, etc. This execution activity is indexed in a faceted fashion in order to allow for instantaneous lookups.
Dynamic analysis capabilities do not only focus on execution traces but also on running static+dynamic analysis plugins to decode RAT malware configs and extract network infrastructure that may have not been observed during real time execution.
VirusTotal integrates external behavioural engines sandboxes. The list of external partners can be found here.
Find below a description about our in-house sandboxes:
Box Of Apples
MacOS sandbox hooking system calls.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
MacOS | MachO, DMG, PKG, ISO, shell scripts, apple script, Zipped APP | Yes | Yes | Yes | No | No | No |
OS X Sandbox
MacOS 11.6 Sandbox.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
MacOS 11.6 | MachO, DMG, PKG, ISO | Yes | Yes | Yes | No | Yes | No |
VirusTotal Droidy
VirusTotal Android Sandbox. The API logging is inspired by droidmon.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Android 4.4 | Android application (APK) | No | Yes | Yes | No | No | No |
VirusTotal Jujubox
Windows dynamic analysis sandbox. Frida is used for hooking and tracking Windows API calls.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows 7 | EXE, DLL, MSI, CHM, BAT, CRX, PDF, VBS, MS Office Documents, Powershell | Yes | Yes | Yes | No | No | Yes |
VirusTotal Observer
Windows sysmon based sandbox.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows 7 | EXE, DLL, MSI, CHM, BAT, CRX, PDF, VBS, MS Office Documents, Powershell | No | No | No | No | No | No |
VirusTotal R2DBox
R2DBox is an Android 8 sandbox which uses Frida to make the hooks. It runs on GCE machines.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Android 8 | Android application (APK) | Yes | Yes | Yes | No | No | No |
Zenbox
Windows 10 Sandbox. It provides MITRE matrix, signature detection and memory dumps. Runs on GC VmwareEngine.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows 10 | EXE, DLL, MSI, CHM, BAT, CRX, PDF, VBS, MS Office Documents, Powershell | Yes | Yes | Yes | Yes | Yes | Yes |
ZIP files without password will be processed executing the first binary found within the ZIP.
ZIP files with password will be processed only if the password is "infected".
Zenbox Android
Supports APKs up to Android 12 (SDK 30).
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Android 12 | Android application (APK) | Yes | Yes | Yes | No | Yes | No |
Zenbox Linux
Supports X86, X86_64, ARM, MIPS.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Ubuntu 20.04 | ELF, Scripts, DEB | Yes | Yes | Yes | No | Yes | No |
ZIP files without password will be processed executing the first binary found within the ZIP.
ZIP files with password will be processed only if the password is "infected".
Zenbox macOS
MacOS ARM Sandbox.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
MacOS 13 | MachO, DMG, PKG | Yes | Yes | Yes | No | Yes | No |
CAPA
Extraction of behaviour capabilities with Mandiant CAPA
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows/Linux | EXE, ELF, DLLS | No | Yes | No | No | Yes | No |
CAPE Sandbox
Windows Sandbox using CAPEv2
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows 10 | EXE, DLL, MSI, CHM, BAT, CRX, PDF, VBS, MS Office Documents, Powershell | Yes (with TLSdump) | Yes | Yes | Yes | Yes | Yes |
CAPE Linux
Linux Sandbox using CAPEv2
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Sysmon Logs |
---|---|---|---|---|---|---|---|
Ubuntu 22.04 | ELF, Scripts | Yes | Yes | Yes | Yes | Yes | Yes |
Cuckoofork
Windows XP Sandbox.
Operating System | Type of file | Pcap | HTML Report | Screenshots | Memory Dumps | MITRE Signatures | Event Logs (EVTX) |
---|---|---|---|---|---|---|---|
Windows XP | EXE, DLL, MSI, CHM, BAT, CRX, PDF, VBS, MS Office Documents, Powershell | Yes | No | No | No | No | No |
Updated about 1 month ago