{"componentChunkName":"component---src-templates-post-template-js","path":"/malware-flarevm-setup-en","result":{"data":{"markdownRemark":{"id":"f1bfe64a-b00f-573b-a127-3c2074ee6359","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/malware-flarevm-setup\">original page</a>.</p>\n</blockquote>\n<p>This article documents the setup process for FLARE VM, a Windows distribution designed for malware analysis.</p>\n<p>FLARE VM is an open-source, Windows-based security distribution designed for reverse engineers, malware analysts, incident responders, forensics investigators, and penetration testers.</p>\n<p>Starting from Version 3.0, it also supports Windows 10.</p>\n<p>Reference: <a href=\"https://github.com/mandiant/flare-vm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mandiant/flare-vm</a></p>\n<p>Reference: <a href=\"https://www.mandiant.com/resources/flare-vm-update\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FLARE VM Update | Mandiant</a></p>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li><a href=\"#environment\">Environment</a></li>\n<li>\n<p><a href=\"#pre-installation-preparation\">Pre-Installation Preparation</a></p>\n<ul>\n<li><a href=\"#disabling-windows-defender\">Disabling Windows Defender</a></li>\n<li><a href=\"#taking-a-snapshot\">Taking a Snapshot</a></li>\n<li><a href=\"#downloading-flarevm\">Downloading FlareVM</a></li>\n</ul>\n</li>\n<li><a href=\"#installing-flarevm\">Installing FlareVM</a></li>\n<li><a href=\"#flarevm-package-installation-method\">FlareVM Package Installation Method</a></li>\n<li>\n<p><a href=\"#post-installation-tasks\">Post-Installation Tasks</a></p>\n<ul>\n<li><a href=\"#installing-additional-packages\">Installing Additional Packages</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#bonus-tools-installed-with-flarevm\">Bonus: Tools Installed with FlareVM</a></p>\n<ul>\n<li><a href=\"#android\">Android</a></li>\n<li><a href=\"#decompilers\">Decompilers</a></li>\n<li><a href=\"#disassemblers\">Disassemblers</a></li>\n<li><a href=\"#net\">.NET</a></li>\n<li><a href=\"#autoit\">AutoIt</a></li>\n<li><a href=\"#flash\">Flash</a></li>\n<li><a href=\"#forensic\">Forensic</a></li>\n<li><a href=\"#hex-editors\">Hex Editors</a></li>\n<li><a href=\"#java\">Java</a></li>\n<li><a href=\"#office\">Office</a></li>\n<li><a href=\"#pdf\">PDF</a></li>\n<li><a href=\"#pe\">PE</a></li>\n<li><a href=\"#pentest\">Pentest</a></li>\n<li><a href=\"#powershell\">Powershell</a></li>\n<li><a href=\"#text-editors\">Text Editors</a></li>\n<li><a href=\"#visual-basic\">Visual Basic</a></li>\n<li><a href=\"#web-application\">Web Application</a></li>\n<li><a href=\"#utilities\">Utilities</a></li>\n</ul>\n</li>\n<li><a href=\"#summary\">Summary</a></li>\n</ul>\n<h2 id=\"environment\" style=\"position:relative;\"><a href=\"#environment\" aria-label=\"environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Environment</h2>\n<p>FlareVM will be installed on a virtual machine with the following specifications:</p>\n<ul>\n<li>\n<p>Windows 10 Pro 1903 English</p>\n<ul>\n<li>CPU: 3 core</li>\n<li>RAM: 8192GB</li>\n<li>Storage: 80GB</li>\n</ul>\n</li>\n<li>FlareVM 3.1</li>\n</ul>\n<p> While I haven’t tested it personally, I’ve seen articles mentioning that FlareVM installation fails on Windows 10 versions newer than 1903, so I used 1903 for this setup.</p>\n<p>According to <a href=\"https://github.com/mandiant/flare-vm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mandiant/flare-vm</a>, the system requirements are as follows:</p>\n<p>Note that the 60GB requirement refers to available storage space after OS installation, not the total VM storage capacity.</p>\n<div class=\"gatsby-highlight\" data-language=\"bash\"><pre class=\"language-bash\"><code class=\"language-bash\">Requirements\n<span class=\"token number\">60</span> GB Hard Drive\n  Additional space needed after VM is downloaded/installed\n<span class=\"token number\">2</span> GB RAM</code></pre></div>\n<h2 id=\"pre-installation-preparation\" style=\"position:relative;\"><a href=\"#pre-installation-preparation\" aria-label=\"pre installation preparation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pre-Installation Preparation</h2>\n<h3 id=\"disabling-windows-defender\" style=\"position:relative;\"><a href=\"#disabling-windows-defender\" aria-label=\"disabling windows defender permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Disabling Windows Defender</h3>\n<p>Basically, you can follow the steps in the article below:</p>\n<p>Reference: <a href=\"https://www.howtogeek.com/howto/15788/how-to-uninstall-disable-and-remove-windows-defender.-also-how-turn-it-off/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How To Uninstall, Disable, and Remove Windows Defender</a></p>\n<p>In my environment (1903), to disable Defender, I also needed to disable the Tamper Protection feature.</p>\n<p>The following article is helpful:</p>\n<p>Reference: <a href=\"https://www.pasoble.jp/windows/10/08885.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Windows 10 Windows Defenderを完全に無効化する-パソブル</a></p>\n<p>Although not a requirement, I also disabled Windows Firewall while I was at it.</p>\n<h3 id=\"taking-a-snapshot\" style=\"position:relative;\"><a href=\"#taking-a-snapshot\" aria-label=\"taking a snapshot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Taking a Snapshot</h3>\n<p>Before proceeding with FlareVM installation, take a snapshot of the VM.</p>\n<h3 id=\"downloading-flarevm\" style=\"position:relative;\"><a href=\"#downloading-flarevm\" aria-label=\"downloading flarevm permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Downloading FlareVM</h3>\n<p>Download FlareVM 3.1 from the Release page below:</p>\n<p>Reference: <a href=\"https://github.com/mandiant/flare-vm/releases\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Releases · mandiant/flare-vm</a></p>\n<h2 id=\"installing-flarevm\" style=\"position:relative;\"><a href=\"#installing-flarevm\" aria-label=\"installing flarevm permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Installing FlareVM</h2>\n<p>Extract the downloaded FlareVM file on the VM.</p>\n<p>Navigate to the extracted folder in PowerShell running with administrator privileges and execute the following commands in order:</p>\n<p> Internet connection is required.</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\"><span class=\"token function\">Unblock-File</span> <span class=\"token punctuation\">.</span>\\install<span class=\"token punctuation\">.</span>ps1\n<span class=\"token function\">Set-ExecutionPolicy</span> Unrestricted\n<span class=\"token punctuation\">.</span>\\install<span class=\"token punctuation\">.</span>ps1 <span class=\"token operator\">-</span>password &lt;password></code></pre></div>\n<p>If successful, installations and setups will proceed sequentially like this:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 767px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/eec952e1be0ff1806c8ce4e1e75d34c3/6c2f2/image-16.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 73.75%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/eec952e1be0ff1806c8ce4e1e75d34c3/8ac56/image-16.webp 240w,\n/static/eec952e1be0ff1806c8ce4e1e75d34c3/d3be9/image-16.webp 480w,\n/static/eec952e1be0ff1806c8ce4e1e75d34c3/e0ad8/image-16.webp 767w\"\n              sizes=\"(max-width: 767px) 100vw, 767px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/eec952e1be0ff1806c8ce4e1e75d34c3/8ff5a/image-16.png 240w,\n/static/eec952e1be0ff1806c8ce4e1e75d34c3/e85cb/image-16.png 480w,\n/static/eec952e1be0ff1806c8ce4e1e75d34c3/6c2f2/image-16.png 767w\"\n            sizes=\"(max-width: 767px) 100vw, 767px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/eec952e1be0ff1806c8ce4e1e75d34c3/6c2f2/image-16.png\"\n            alt=\"image-16.png\"\n            title=\"image-16.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>It took an incredibly long time to complete (didn’t finish even after an overnight run).</p>\n<p>Be patient and wait.</p>\n<h2 id=\"flarevm-package-installation-method\" style=\"position:relative;\"><a href=\"#flarevm-package-installation-method\" aria-label=\"flarevm package installation method permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>FlareVM Package Installation Method</h2>\n<p>FlareVM automatically performs package installation, registry modifications, and OS reboots after executing the PowerShell script.</p>\n<p>It uses Chocolatey, a package manager, to automate package installation on Windows.</p>\n<p>Reference: <a href=\"https://en.wikipedia.org/wiki/Chocolatey\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Chocolatey - Wikipedia</a></p>\n<p>Package updates can also be done with the <code class=\"language-text\">chocolatey upgrade ${packageName}</code> command, which seems very useful for building and managing lab environments.</p>\n<p>At least for now, it appears to have a much richer package selection than winget.</p>\n<p>Reference: <a href=\"https://qiita.com/konta220/items/95b40b4647a737cb51aa\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Chocolateyを使った環境構築の時のメモ - Qiita</a></p>\n<p>I plan to write an article about building environments using Chocolatey in the future.</p>\n<h2 id=\"post-installation-tasks\" style=\"position:relative;\"><a href=\"#post-installation-tasks\" aria-label=\"post installation tasks permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Post-Installation Tasks</h2>\n<p>Once installation is complete, the wallpaper will change as shown below:</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/501290d06d3811ab2de677a9991d430d/0b533/image.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 76.66666666666666%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/501290d06d3811ab2de677a9991d430d/8ac56/image.webp 240w,\n/static/501290d06d3811ab2de677a9991d430d/d3be9/image.webp 480w,\n/static/501290d06d3811ab2de677a9991d430d/b0a15/image.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/501290d06d3811ab2de677a9991d430d/8ff5a/image.png 240w,\n/static/501290d06d3811ab2de677a9991d430d/e85cb/image.png 480w,\n/static/501290d06d3811ab2de677a9991d430d/0b533/image.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/501290d06d3811ab2de677a9991d430d/0b533/image.png\"\n            alt=\"image.png\"\n            title=\"image.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Finally, install additional packages and change the network settings to a host-only adapter.</p>\n<p>When deploying FlareVM for malware analysis, make sure to verify that the environment is completely isolated from the network.</p>\n<h3 id=\"installing-additional-packages\" style=\"position:relative;\"><a href=\"#installing-additional-packages\" aria-label=\"installing additional packages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Installing Additional Packages</h3>\n<p>First, install the tools listed as additional packages in the article below:</p>\n<div class=\"gatsby-highlight\" data-language=\"powershell\"><pre class=\"language-powershell\"><code class=\"language-powershell\">choco install exiftool<span class=\"token punctuation\">,</span> trid<span class=\"token punctuation\">,</span> grep<span class=\"token punctuation\">,</span> stirling-jp<span class=\"token punctuation\">,</span> sakuraeditor<span class=\"token punctuation\">,</span> irfanview<span class=\"token punctuation\">,</span> irfanviewplugins<span class=\"token punctuation\">,</span> hashtab<span class=\"token punctuation\">,</span> audacity<span class=\"token punctuation\">,</span> winmerge<span class=\"token punctuation\">,</span> teraterm<span class=\"token punctuation\">,</span> fiddler<span class=\"token punctuation\">,</span> sqlitebrowser<span class=\"token punctuation\">,</span> ultravnc<span class=\"token punctuation\">,</span> gnuwin32-coreutils<span class=\"token punctuation\">.</span>install</code></pre></div>\n<p>Reference: <a href=\"https://soji256.hatenablog.jp/entry/2019/10/14/224121\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FLARE VM を使って Windows10 に解析環境を構築する - setodaNote</a></p>\n<p>I installed exiftool and fiddler, among others, as I use them frequently.</p>\n<p>I also installed Windows Terminal, Noriben, and PowerToys additionally.</p>\n<p>Noriben doesn’t work properly with FlareVM’s default settings, so the configuration described <a href=\"/malware-flarevm-loadpmlerror-en\">here</a> is required.</p>\n<h2 id=\"bonus-tools-installed-with-flarevm\" style=\"position:relative;\"><a href=\"#bonus-tools-installed-with-flarevm\" aria-label=\"bonus tools installed with flarevm permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Bonus: Tools Installed with FlareVM</h2>\n<p>The tools deployed with FlareVM are listed in the Readme.</p>\n<p>Reference: <a href=\"https://github.com/mandiant/flare-vm#readme\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mandiant/flare-vm</a></p>\n<p>Here are some interesting tools I picked out and summarized:</p>\n<h3 id=\"android\" style=\"position:relative;\"><a href=\"#android\" aria-label=\"android permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Android</h3>\n<ul>\n<li>dex2jar</li>\n<li>apktool</li>\n</ul>\n<p>I’ve used these two tools when Android app challenges appeared in CTFs.</p>\n<p>They can extract APK files and decompile them into a readable Java-like format.</p>\n<h3 id=\"decompilers\" style=\"position:relative;\"><a href=\"#decompilers\" aria-label=\"decompilers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Decompilers</h3>\n<ul>\n<li>RetDec</li>\n</ul>\n<p>I hadn’t used RetDec before, but it appears to be an OSS decompiler developed by Avast.</p>\n<p>It can decompile ELF and PE files, and can also output decompilation results in Python-like language as well as C. Amazing.</p>\n<p>Reference: <a href=\"https://github.com/avast/retdec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">avast/retdec: RetDec is a retargetable machine-code decompiler based on LLVM.</a></p>\n<p>Reference: <a href=\"https://qiita.com/hogehuga/items/b502cd572a5065881c91\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">avastのretdecをインストールする - Qiita</a></p>\n<h3 id=\"disassemblers\" style=\"position:relative;\"><a href=\"#disassemblers\" aria-label=\"disassemblers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Disassemblers</h3>\n<ul>\n<li>Ghidra</li>\n<li>IDA Free (5.0 &#x26; 7.0)</li>\n<li>Binary Ninja Demo</li>\n<li>radare2</li>\n<li>Cutter</li>\n</ul>\n<p>Various disassemblers are included.</p>\n<p>I hadn’t used Cutter before, but it disassembles quite cleanly.</p>\n<p>The dark mode is also nice.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 960px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/2f94f5708ee99f3736b639d52de6ad76/db664/screenshot.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 40.833333333333336%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/2f94f5708ee99f3736b639d52de6ad76/8ac56/screenshot.webp 240w,\n/static/2f94f5708ee99f3736b639d52de6ad76/d3be9/screenshot.webp 480w,\n/static/2f94f5708ee99f3736b639d52de6ad76/e46b2/screenshot.webp 960w,\n/static/2f94f5708ee99f3736b639d52de6ad76/f992d/screenshot.webp 1440w,\n/static/2f94f5708ee99f3736b639d52de6ad76/882b9/screenshot.webp 1920w,\n/static/2f94f5708ee99f3736b639d52de6ad76/f2379/screenshot.webp 2509w\"\n              sizes=\"(max-width: 960px) 100vw, 960px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/2f94f5708ee99f3736b639d52de6ad76/8ff5a/screenshot.png 240w,\n/static/2f94f5708ee99f3736b639d52de6ad76/e85cb/screenshot.png 480w,\n/static/2f94f5708ee99f3736b639d52de6ad76/d9199/screenshot.png 960w,\n/static/2f94f5708ee99f3736b639d52de6ad76/07a9c/screenshot.png 1440w,\n/static/2f94f5708ee99f3736b639d52de6ad76/29114/screenshot.png 1920w,\n/static/2f94f5708ee99f3736b639d52de6ad76/db664/screenshot.png 2509w\"\n            sizes=\"(max-width: 960px) 100vw, 960px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/2f94f5708ee99f3736b639d52de6ad76/d9199/screenshot.png\"\n            alt=\"img\"\n            title=\"img\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Reference: <a href=\"https://github.com/rizinorg/cutter\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">rizinorg/cutter: Free and Open Source Reverse Engineering Platform powered by rizin</a></p>\n<h3 id=\"net\" style=\"position:relative;\"><a href=\"#net\" aria-label=\"net permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>.NET</h3>\n<ul>\n<li>de4dot</li>\n<li>Dot Net String Decoder (DNSD)</li>\n<li>dnSpy</li>\n<li>DotPeek</li>\n<li>ILSpy</li>\n<li>RunDotNetDll</li>\n</ul>\n<p>ILSpy and dnSpy are standard tools, but there are quite a few others too.</p>\n<p>de4dot appears to be a deobfuscation tool. Should be useful for malware analysis.</p>\n<p>Reference: <a href=\"https://github.com/de4dot/de4dot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">de4dot/de4dot: .NET deobfuscator and unpacker.</a></p>\n<h3 id=\"autoit\" style=\"position:relative;\"><a href=\"#autoit\" aria-label=\"autoit permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>AutoIt</h3>\n<ul>\n<li>AutoItExtractor</li>\n<li>UnAutoIt</li>\n<li>Exe2Aut</li>\n</ul>\n<p>This is my first time learning about AutoIt. Is it similar to VBScript?</p>\n<p>Reference: <a href=\"https://en.wikipedia.org/wiki/AutoIt\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">AutoIt - Wikipedia</a></p>\n<h3 id=\"flash\" style=\"position:relative;\"><a href=\"#flash\" aria-label=\"flash permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Flash</h3>\n<ul>\n<li>FFDec</li>\n</ul>\n<p>There’s even a decompiler for Flash.</p>\n<h3 id=\"forensic\" style=\"position:relative;\"><a href=\"#forensic\" aria-label=\"forensic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Forensic</h3>\n<ul>\n<li>Volatility</li>\n<li>Autopsy</li>\n</ul>\n<p>I’ll repeat this 100 times: Volatility is a memory forensics tool.</p>\n<p>I wondered what the difference from ChatEngine was, but it can be used from the CLI. Convenient.</p>\n<p>Reference: <a href=\"https://github.com/volatilityfoundation/volatility\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">volatilityfoundation/volatility: An advanced memory forensics framework</a></p>\n<h3 id=\"hex-editors\" style=\"position:relative;\"><a href=\"#hex-editors\" aria-label=\"hex editors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Hex Editors</h3>\n<ul>\n<li>FileInsight</li>\n<li>HxD</li>\n<li>010 Editor</li>\n</ul>\n<p>My favorite Tweak isn’t included…</p>\n<h3 id=\"java\" style=\"position:relative;\"><a href=\"#java\" aria-label=\"java permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Java</h3>\n<ul>\n<li>JD-GUI</li>\n<li>Bytecode-Viewer</li>\n<li>Java-Deobfuscator</li>\n</ul>\n<p>There’s even a Java deobfuscation tool.</p>\n<p>I haven’t encountered it in CTFs yet, but I wonder if it’s commonly used in malware analysis.</p>\n<h3 id=\"office\" style=\"position:relative;\"><a href=\"#office\" aria-label=\"office permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Office</h3>\n<ul>\n<li>Offvis</li>\n<li>OfficeMalScanner</li>\n<li>oledump.py</li>\n<li>rtfdump.py</li>\n<li>msoffcrypto-crack.py</li>\n</ul>\n<p>There’s a tool specifically for scanning Office file malware.</p>\n<p>Reference: <a href=\"https://www.optimizationcore.com/security/officemalscanner-microsoft-office-files-malware-scanner/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">OfficeMalScanner - Microsoft Office Files Malware Scanner</a></p>\n<h3 id=\"pdf\" style=\"position:relative;\"><a href=\"#pdf\" aria-label=\"pdf permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>PDF</h3>\n<ul>\n<li>PDFiD</li>\n<li>PDFParser</li>\n<li>PDFStreamDumper</li>\n</ul>\n<h3 id=\"pe\" style=\"position:relative;\"><a href=\"#pe\" aria-label=\"pe permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>PE</h3>\n<ul>\n<li>PEiD</li>\n<li>ExplorerSuite (CFF Explorer)</li>\n<li>PEview</li>\n<li>DIE</li>\n<li>PeStudio</li>\n<li>PEBear</li>\n<li>ResourceHacker</li>\n<li>LordPE</li>\n<li>PPEE(puppy)</li>\n</ul>\n<p>I often use PEiD and PeStudio, but there are quite a few others.</p>\n<p>I’ll try them out sometime.</p>\n<h3 id=\"pentest\" style=\"position:relative;\"><a href=\"#pentest\" aria-label=\"pentest permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pentest</h3>\n<ul>\n<li>Windows binaries from Kali Linux</li>\n</ul>\n<p>Seems like a collection of Kali tools like netcat that can be used on Windows.</p>\n<p>Reference: <a href=\"https://www.kali.org/tools/windows-binaries/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">windows-binaries | Kali Linux Tools</a></p>\n<h3 id=\"powershell\" style=\"position:relative;\"><a href=\"#powershell\" aria-label=\"powershell permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Powershell</h3>\n<ul>\n<li>PSDecode</li>\n</ul>\n<h3 id=\"text-editors\" style=\"position:relative;\"><a href=\"#text-editors\" aria-label=\"text editors permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Text Editors</h3>\n<ul>\n<li>SublimeText3</li>\n<li>Notepad++</li>\n<li>Vim</li>\n</ul>\n<p>I want to add VSCode manually…</p>\n<h3 id=\"visual-basic\" style=\"position:relative;\"><a href=\"#visual-basic\" aria-label=\"visual basic permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Visual Basic</h3>\n<ul>\n<li>VBDecompiler</li>\n</ul>\n<h3 id=\"web-application\" style=\"position:relative;\"><a href=\"#web-application\" aria-label=\"web application permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Web Application</h3>\n<ul>\n<li>BurpSuite Free Edition</li>\n<li>HTTrack</li>\n</ul>\n<p>HTTrack can recursively download websites and build a pseudo mirror site locally.</p>\n<p>Reference: <a href=\"https://eririn25.com/tool/httrack/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">【画像付き】httrackでホームページを丸ごとダウンロードする使い方</a></p>\n<h3 id=\"utilities\" style=\"position:relative;\"><a href=\"#utilities\" aria-label=\"utilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Utilities</h3>\n<p>Omitted.</p>\n<p>There are several hash tools included, but Hashcat isn’t there.</p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>I set up FlareVM, which I’ve been curious about for a while.</p>\n<p>It was very instructive to learn that custom distributions like this can be created on Windows as well.</p>","fields":{"slug":"/malware-flarevm-setup-en","tagSlugs":["/tag/malware-en/","/tag/flare-vm-en/","/tag/備忘録/","/tag/english/"]},"frontmatter":{"date":"2021-12-01","description":"This article documents the setup process for FLARE VM, a Windows distribution designed for malware analysis.","tags":["Malware (en)","FlareVM (en)","備忘録","English"],"title":"Installing FlareVM 3.1 Malware Analysis Distribution on Windows 10","socialImage":{"publicURL":"/static/dc4d8b7f8795f3c3d3489d9957d155f2/no-image.png"}}}},"pageContext":{"slug":"/malware-flarevm-setup-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}