Buster Sandbox Analyzer
Buster Sandbox Analyzer
I edit the first post to include information about where to download the tool.
Official site is:
http://bsa.isoftware.nl
And the tool can be downloaded from:
http://bsa.novirusthanks.org/downloads/bsa.rar
http://www.woodmann.com/virusbuster/bsa.rar
Actual version: 1.88
MD5: 32d92812f399da48e61ca810b09f11fc
Version: 1.88 Update 4 [Released 24/04/2014]
http://www.woodmann.com/virusbuster/bsa ... date_4.rar
--- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x ---
Hi.
As commented already I decided to change the name of my tool because the purpose of it changed.
The tool will now be named Buster Sandbox Analyzer or BSA to short it.
The main goal of the tool will be to analyze the behaviour of sandboxed processes and decide if the the changes made to system may be malware suspicious.
It can also be used just to check what changes (files and registry) were made in the system.
Instructions to run BSA:
Of course, in order to run BSA Sandboxie must be installed and running properly.
BSA does not require installation. Just create a folder and copy BSA.EXE and BSA.DAT inside.
When you run BSA you can see this:
To start working with the tool you just need to specify with what Sandbox folder you will work. You must specify the complete path to the sandbox folder. e.g. for the DefaultBox would be something like:
C:\Sandbox\ExampleUser\DefaultBox
You only will have to specify the sandbox path one time. When you close BSA the program automatically will remember the used sandboxes. This information will be stored under \CONFIG folder with the name BSA.INI.
The sandbox folder must exist and must be empty. BSA will check that both conditions are accomplished and if any of them is not BSA will warn about it.
When you are ready to start working with the tool press "Start" button. If the sandbox folder exists and the folder is empty BSA will be ready for next step.
After pressing "Start" two buttons get enabled.
Now it´s the moment to sandbox whatever you want.
If you are interested in getting port differences press "Check Ports" button if not just skip it.
When you are done terminate all sandboxed processes and then click "Find Differences".
If Sandboxie is still in use BSA will warn about that.
At this point if you are only interested in getting the changes made to system you can quit BSA. You will find FileDiff.TXT, RegDiff.TXT and PortDiff.TXT (when available) at BSA´s folder.
You can open those files with any text editor because they are in plain text.
If you are interested in the malware analysis click the button.
BSA will perform several checks to the changes made to system looking for malware behaviour.
At the moment some of the checks are not available.
When you close malware analyser results of the analysis will be saved to ANALISIS.TXT.
On next message I will explain the exclusion list, the BSA.DAT format and the file differences format.
Official site is:
http://bsa.isoftware.nl
And the tool can be downloaded from:
http://bsa.novirusthanks.org/downloads/bsa.rar
http://www.woodmann.com/virusbuster/bsa.rar
Actual version: 1.88
MD5: 32d92812f399da48e61ca810b09f11fc
Version: 1.88 Update 4 [Released 24/04/2014]
http://www.woodmann.com/virusbuster/bsa ... date_4.rar
--- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x --- x ---
Hi.
As commented already I decided to change the name of my tool because the purpose of it changed.
The tool will now be named Buster Sandbox Analyzer or BSA to short it.
The main goal of the tool will be to analyze the behaviour of sandboxed processes and decide if the the changes made to system may be malware suspicious.
It can also be used just to check what changes (files and registry) were made in the system.
Instructions to run BSA:
Of course, in order to run BSA Sandboxie must be installed and running properly.
BSA does not require installation. Just create a folder and copy BSA.EXE and BSA.DAT inside.
When you run BSA you can see this:
To start working with the tool you just need to specify with what Sandbox folder you will work. You must specify the complete path to the sandbox folder. e.g. for the DefaultBox would be something like:
C:\Sandbox\ExampleUser\DefaultBox
You only will have to specify the sandbox path one time. When you close BSA the program automatically will remember the used sandboxes. This information will be stored under \CONFIG folder with the name BSA.INI.
The sandbox folder must exist and must be empty. BSA will check that both conditions are accomplished and if any of them is not BSA will warn about it.
When you are ready to start working with the tool press "Start" button. If the sandbox folder exists and the folder is empty BSA will be ready for next step.
After pressing "Start" two buttons get enabled.
Now it´s the moment to sandbox whatever you want.
If you are interested in getting port differences press "Check Ports" button if not just skip it.
When you are done terminate all sandboxed processes and then click "Find Differences".
If Sandboxie is still in use BSA will warn about that.
At this point if you are only interested in getting the changes made to system you can quit BSA. You will find FileDiff.TXT, RegDiff.TXT and PortDiff.TXT (when available) at BSA´s folder.
You can open those files with any text editor because they are in plain text.
If you are interested in the malware analysis click the button.
BSA will perform several checks to the changes made to system looking for malware behaviour.
At the moment some of the checks are not available.
When you close malware analyser results of the analysis will be saved to ANALISIS.TXT.
On next message I will explain the exclusion list, the BSA.DAT format and the file differences format.
Last edited by Buster on Thu Apr 24, 2014 4:30 pm, edited 36 times in total.
Exclusion list:
The exclusion list is a set of strings that the user wants to be excluded from results. All lines containing a string that appears in the exclusion list will be removed from reports.
You can define exclusions for file, registry and ports. There is an exclusion list editor included in BSA but files can be directly edited with any text editor.
File exclusion strings are not sandbox path relative. This mean you must specify the path or file as it will appear in the real disk. e.g.:
C:\pagefile.sys would be ok
C:\SandBox\ExampleUser\DefaultBox\drive\C\pagefile.sys would not be ok.
Registry exclusion list uses relative strings. Sandboxie will "translate" HKEY_CURRENT_USER to user\current\ and HKEY_LOCAL_MACHINE to machine\.
To avoid mistakes you should take strings directly from RegDiff.TXT an include them in exclusion list.
Exclusion list is case insensitive.
The exclusion list is a set of strings that the user wants to be excluded from results. All lines containing a string that appears in the exclusion list will be removed from reports.
You can define exclusions for file, registry and ports. There is an exclusion list editor included in BSA but files can be directly edited with any text editor.
File exclusion strings are not sandbox path relative. This mean you must specify the path or file as it will appear in the real disk. e.g.:
C:\pagefile.sys would be ok
C:\SandBox\ExampleUser\DefaultBox\drive\C\pagefile.sys would not be ok.
Registry exclusion list uses relative strings. Sandboxie will "translate" HKEY_CURRENT_USER to user\current\ and HKEY_LOCAL_MACHINE to machine\.
To avoid mistakes you should take strings directly from RegDiff.TXT an include them in exclusion list.
Exclusion list is case insensitive.
Last edited by Buster on Sun Nov 01, 2009 7:26 pm, edited 7 times in total.
File differences format:
There are 3 difference files: FileDiff.TXT, RegDiff.TXT and PortDiff.TXT
In FileDiff.TXT there are 4 symbols as first char in every line.
"+" represents a new file: A file that is not present in real disk so it´s created.
"-" represents a deleted file: A file that being present in real disk and that was deleted.
"~" represents a modified file: A file that was changed.
"=" represents a copied file: Sandboxie copied a file inside the sandbox. This doesn´t represent any change.
Temporal files (files that are created and later deleted) can not be represented at the moment. Probably it would be necessary the use of an injected DLL to catch that kind of files.
In RegDiff.TXT you can find next information:
"created registry key": The registry key was created.
"deleted registry key": The registry key was deleted.
"empty value key": The value of a key was removed.
"deleted value key": The value of a key was deleted.
When the content of a value changes you get something like:
user\current\software\Microsoft\Windows\CurrentVersion\Applets\Regedit\FindFlags = 0E000000
Important: Some registry and value keys are modified by Sandboxie not by sandboxed processes. I suggest running CALC.EXE (or any other program that does not modify the registry) and add strings from resulting RegDiff.TXT to exclusion list.
There are 3 difference files: FileDiff.TXT, RegDiff.TXT and PortDiff.TXT
In FileDiff.TXT there are 4 symbols as first char in every line.
"+" represents a new file: A file that is not present in real disk so it´s created.
"-" represents a deleted file: A file that being present in real disk and that was deleted.
"~" represents a modified file: A file that was changed.
"=" represents a copied file: Sandboxie copied a file inside the sandbox. This doesn´t represent any change.
Temporal files (files that are created and later deleted) can not be represented at the moment. Probably it would be necessary the use of an injected DLL to catch that kind of files.
In RegDiff.TXT you can find next information:
"created registry key": The registry key was created.
"deleted registry key": The registry key was deleted.
"empty value key": The value of a key was removed.
"deleted value key": The value of a key was deleted.
When the content of a value changes you get something like:
user\current\software\Microsoft\Windows\CurrentVersion\Applets\Regedit\FindFlags = 0E000000
Important: Some registry and value keys are modified by Sandboxie not by sandboxed processes. I suggest running CALC.EXE (or any other program that does not modify the registry) and add strings from resulting RegDiff.TXT to exclusion list.
Last edited by Buster on Sun Nov 01, 2009 7:29 pm, edited 3 times in total.
BSA.DAT format:
The malware analyzer module is a bit flexible and can be customized by the user.
[File_Types_Copied_Windows]: Here the user defines what file types (extensions) that get copied into Windows folder must raise an alert.
By default .exe, .dll and .sys are watched. Other interesting file types to watch could be .VBS e.g.
Why this? Many malwares copy their components in Windows folder.
[File_Types_Modified]: Here the user defines what file types that are modified must be watched.
By default .exe and .dll files are watched.
Why this? Modify an .exe is a typical action of viruses.
[File_Types_Copied_AutoStart]: Here we define what file types must be watched when copied to AutoStart locations.
AutoStart location is e.g. startup folder.
By default .exe and .dll files are watched.
Why this? It´s typical of malwares to get their components included in autostart locations so they run when Windows loads.
[AutoStart_Files_Added_or_Modified]: Here we define what autostart files must be watched when added to disk or modified.
By default the list of autostart files is:
win.ini
system.ini
wininit.ini
winstart.bat
dosstart.bat
autoexec.nt
config.nt
autoexec.bat
config.sys
autorun.inf
Why this? Other method of malwares to get running when Windows loads is adding theirself to one of those files.
[AutoStart_Registry_Created_or_Modified]: Here we define what registry autostart locations to watch.
The list is a bit large so I will not put it here. Just as example:
\software\microsoft\windows\currentversion\run
Why this? It´s very typical of malwares to add theirself into a registry autostart location so they get loaded when Windows boots.
If you want to include new file types to watch or registry autostart locations or whatever feel free to do it. You can also remove or edit actual values.
You just need to know that after a section "[blablabla]" you must include all the values and there can not be an empty space between them.
An empty line must be included between the last value and the next section.
That´s fine.
That´s wrong and malware analyzer module will not work properly.
The malware analyzer module is a bit flexible and can be customized by the user.
[File_Types_Copied_Windows]: Here the user defines what file types (extensions) that get copied into Windows folder must raise an alert.
By default .exe, .dll and .sys are watched. Other interesting file types to watch could be .VBS e.g.
Why this? Many malwares copy their components in Windows folder.
[File_Types_Modified]: Here the user defines what file types that are modified must be watched.
By default .exe and .dll files are watched.
Why this? Modify an .exe is a typical action of viruses.
[File_Types_Copied_AutoStart]: Here we define what file types must be watched when copied to AutoStart locations.
AutoStart location is e.g. startup folder.
By default .exe and .dll files are watched.
Why this? It´s typical of malwares to get their components included in autostart locations so they run when Windows loads.
[AutoStart_Files_Added_or_Modified]: Here we define what autostart files must be watched when added to disk or modified.
By default the list of autostart files is:
win.ini
system.ini
wininit.ini
winstart.bat
dosstart.bat
autoexec.nt
config.nt
autoexec.bat
config.sys
autorun.inf
Why this? Other method of malwares to get running when Windows loads is adding theirself to one of those files.
[AutoStart_Registry_Created_or_Modified]: Here we define what registry autostart locations to watch.
The list is a bit large so I will not put it here. Just as example:
\software\microsoft\windows\currentversion\run
Why this? It´s very typical of malwares to add theirself into a registry autostart location so they get loaded when Windows boots.
If you want to include new file types to watch or registry autostart locations or whatever feel free to do it. You can also remove or edit actual values.
You just need to know that after a section "[blablabla]" you must include all the values and there can not be an empty space between them.
An empty line must be included between the last value and the next section.
Code: Select all
[File_Types_Copied_AutoStart]
.exe
.dll
.sys
[AutoStart_Files_Added_or_Modified]
Code: Select all
[File_Types_Copied_AutoStart]
.exe
.dll
.sys
[AutoStart_Files_Added_or_Modified]
Code: Select all
[File_Types_Copied_AutoStart]
.exe
.dll
.sys
[AutoStart_Files_Added_or_Modified]
That´s wrong and malware analyzer module will not work properly.
Last edited by Buster on Sat Oct 31, 2009 2:52 am, edited 3 times in total.
Hi Buster,
Actually you would implement the features tzuk somehow considered unnecessary... I do think he's wrong, but might be me too.
With a tool like this one can actually see what's going on at his favorite sandbox)
The only question could be about host processes reading attempts and possible realtime-warning like.
Actually you would implement the features tzuk somehow considered unnecessary... I do think he's wrong, but might be me too.
With a tool like this one can actually see what's going on at his favorite sandbox)
The only question could be about host processes reading attempts and possible realtime-warning like.
Keep up--------------------- BSA WARNING ---------------------
Sandboxie <ANALYSIS>
Process <c:\windows\Explorer.exe>
Details (PID=3888, size=15368KB, ran by Admin)
is trying to write data at a restricted area\path <c:\>.
<A>llow <D>eny <T>erminate
Buster Sandbox Analyzer 1.0 beta has been released. You can get it from here:
http://bsa.qnea.de/bsa.rar
I edited the previous posts to reflect some changes I did since I wrote the information.
Ideas, suggestions, bug reports, ... are welcome!
http://bsa.qnea.de/bsa.rar
I edited the previous posts to reflect some changes I did since I wrote the information.
Ideas, suggestions, bug reports, ... are welcome!
Additional notes:
BSA reflects the changes that would be made to system. Temporal changes are not showed. e.g. if a file is created inside the sandbox and later is deleted before processes are terminated. The same for registry entries.
If a registry value is changed and then changed again and finally the value is the same than the entry from real registry, the change will be reflected anyway.
I´m considering to don´t show that kind of entry. Should I show it even if finally it´s equal to the value from real registry or should I skip it? Any thoughts about this?
Even if the primary goal of BSA is to analyze if sandboxed processes behaviour like a malware, tzuk gave me an interesting idea: BSA could be used to "undo" the effects of malware.
And as mentioned already, BSA can be used just to see what changes to system were done.
BSA reflects the changes that would be made to system. Temporal changes are not showed. e.g. if a file is created inside the sandbox and later is deleted before processes are terminated. The same for registry entries.
If a registry value is changed and then changed again and finally the value is the same than the entry from real registry, the change will be reflected anyway.
I´m considering to don´t show that kind of entry. Should I show it even if finally it´s equal to the value from real registry or should I skip it? Any thoughts about this?
Even if the primary goal of BSA is to analyze if sandboxed processes behaviour like a malware, tzuk gave me an interesting idea: BSA could be used to "undo" the effects of malware.
And as mentioned already, BSA can be used just to see what changes to system were done.
you should list those items imo, maybe some kinda exploit is used to hide the modifications (example: embedded null in registry keys)
also, this item is listed while it is from sandboxie itself:
Defined registry entry added to AutoStart location: machine\software\microsoft\windows nt\currentversion\winlogon\Shell = x
also, this item is listed while it is from sandboxie itself:
Defined registry entry added to AutoStart location: machine\software\microsoft\windows nt\currentversion\winlogon\Shell = x
I wrote about that:Mark_ wrote:also, this item is listed while it is from sandboxie itself:
Defined registry entry added to AutoStart location: machine\software\microsoft\windows nt\currentversion\winlogon\Shell = x
Important: Some registry and value keys are modified by Sandboxie not by sandboxed processes. I suggest running CALC.EXE (or any other program that does not modify the registry) and add strings from resulting RegDiff.TXT to exclusion list.
Who is online
Users browsing this forum: No registered users and 0 guests