Fake Sandbox Processes small script will simulate fake processes of analysis, sandbox and VM software that some malware will try to avoid. You can download the original script made by @x0rz here (thanks, by the way).
You can also download my slightly optimised script from the root directory. The file is named fsp.ps1. This exact script is also used in the FSP installer.
Script-Features
Also Read – PasteHunter : Scanning Pastebin With Yara Rules
Right-click the file and choose “Run with Powershell”
~ OR ~
Open the command line and paste this command (don’t forget to adjust the path):
Powershell -executionpolicy remotesigned -F ‘Your\Path\fsp.ps1’
After pressing enter you can choose to either start or stop all processes.
If you’re just using the script and start it manually, you will have to re-run it at every re-login or startup to create the processes again. In order to autostart the script I made an easy-to-use installer.
fsp-installer.bat
file from the release section or from the folder installer
.—> You can now close the window or press any key to close it. The installation is complete.
If you no longer want this program on your computer, you’ll need the fsp-installer.bat
file again. Run it and chose “u” to start the removal process. Then enter “y” if you are ready to purge all created files.
If the process was successful, you’ll see a confirmation screen – done.
Successfully tested on the following Windows versions:
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…