
The screenshots are to be read from left to right and you will probably have to enlarge the picture in order to decipher all configuration options. Though we will use Windows 7 on both as the VM's OS as it is the most popular for malware attacks.Īs I wanted to keep everything neat and tidy, I opted to merge my screenshots into bigger screenshots. One only supports Windows as its host OS and the other is relying on dependencies only available on Ubuntu.

In order to render your VM undetectable, we have chosen two state-of-the-art tools on Github. Therefore it is critical to setup your malware analysis VM correctly. scanning for RAM, CPU cores, disk space, registry keys and even drivers) they are now able to stop their execution if they detect a virtualized environment. Though, we will not create a generic VM! This VM will provide you with a completely non-detectable environment for Malware Analysis.Īs advanced malware nowadays is able to detect its environment (e.g.

This documentation will provide you with a step-by-step guide to creating a virtual machine over VirtualBox.
