Windows Malware Analysis
VirusTotal Test
VirustTotal Search strings
Update Hash
$DIR = "C:\Users\admin\Desktop\Samples\*.exe"
$count=1
foreach ($file in get-ChildItem $DIR)
(
add-content $file `0
$name=[string]$count + ".exe"
Rename-Item -path $file -newName $name
$count = $count + 1
)
certutil -hashfile -MD5
https://github.com/RockAfeller2013/arcsight_scripts/edit/master/WIN10Base
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
https://digital-forensics.sans.org/community/papers/gcfa/windows-10-forensic-platform_13102
https://digital-forensics.sans.org/community/downloads
https://github.com/StefanScherer/adfs2
https://github.com/nbeede/BoomBox
https://digital-forensics.sans.org/community/papers/gcfa/windows-10-forensic-platform_13102
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
https://github.com/fireeye/commando-vm
https://layer0.xyz/malware_forensics/2020/04/14/Cuckoo_SIFT_With_Ansible/
https://digital-forensics.sans.org/community/downloads%20v
https://www.travismathison.com/posts/Getting-started-FlareVM-Ghidra/
https://kastelo.net/blog/2017-05/coexisting-virtualbox-vmware-fusion-macos/