ThreatLab is an interactive malware analysis sandbox that runs entirely on your machine. No cloud uploads, no per-analysis fees, no session time limits. Just you, an isolated VM, and full control.
Quick AnalysisInstant URL threat assessment without spinning up a VM. Fast triage for suspicious links.
ποΈ
Session HistoryFull session history with recordings, screenshots, EVTX logs, reports, and all collected data preserved for every analysis. Your evidence library, always accessible.
π³
Process Tree VisualizationInteractive process chain viewer with enriched data per node. Trace parent-child relationships, injection paths, and severity scoring across the full execution tree.
π₯οΈ
Custom Base ImagesCreate custom VM templates with pre-installed software, EDR tools, or client-specific configurations.
Why ThreatLab over cloud sandboxes?
No per-analysis feesNo file uploads to third partiesNo session time limitsNo shared infrastructureFull interactive controlUnlimited sessions
Features
Everything under the hood.
A detailed look at what ThreatLab brings to your security workflow.
π¬
Interactive Sandbox
Fully isolated analysis environments powered by Hyper-V
β
Hyper-V IsolationEach session runs in a dedicated VM cloned from a clean Windows 11 base image using differencing disks.
β
Live Desktop InteractionFull keyboard and mouse control via VNC. Interact with malware exactly as an end user would.
β
File & URL AnalysisDrop suspicious files or paste URLs. Samples are placed on the VM desktop for manual detonation.
β
Video RecordingAutomatic session recording from the moment you connect. Saved as WebM files for review.
β
Session Save & ResumeHibernate sessions and resume later. Pick up exactly where you left off.
β
Multiple Concurrent SessionsRun several analysis sessions simultaneously, each with its own isolated VM and monitoring.
β
Configurable ResourcesAdjust VM memory and CPU allocation per session based on your analysis needs.
β
Network IsolationOne-click network isolation cuts internet access while keeping your VNC connection alive.
β
Custom Base OS ImagesCreate modified VM templates with pre-installed software, EDR agents, or client configurations. Each session clones from your chosen image.
β
Global ExclusionsExclude known-good processes from monitoring across all sessions.
π‘
Monitoring & Detection
Deep visibility into everything that happens inside the sandbox
β
Sysmon Event MonitoringProcess creation, network connections, file system changes, registry modifications - all captured in real time.
β
DLL Injection DetectionNon-system DLL loads, remote thread creation, and process access monitoring.
β
Credential Access MonitoringLSASS access detection distinguishes legitimate OS operations from credential theft attempts.
β
Real-Time Threat ScoringEvents scored 0β10 in real time based on behavioral indicators, process chains, and known-bad patterns.
β
Scheduled Task & Service MonitoringTrack persistence mechanisms: task creation, service installation, and startup modifications.
β
Ransomware Canary DetectionCanary files placed in the VM detect ransomware behavior through continuous integrity checks.
β
Windows Defender IntegrationChoose to run sessions with Defender enabled or disabled. Defender alerts are captured when active.
β
Privilege SwitchingToggle between Local Admin and Standard User during a live session to test behavior under different privileges.
β
Certificate Store MonitoringDetects modifications to Windows root and intermediate CA certificate stores, flagging potential MITM or rogue certificate installation.
π
Analysis & Reporting
From raw events to client-ready deliverables
β
AI-Powered Threat AnalysisAutomated threat assessment with risk scoring, behavioral analysis, key findings, and MITRE ATT&CK mapping. Can be toggled on or off in settings.
β
PDF Report GenerationProfessional multi-page reports with executive summary, IOCs, severity distribution, and full technical details.
β
Custom Report BrandingReplace the ThreatLab logo with your own company branding on generated PDF reports.
β
EVTX Log AnalyzerBuilt-in Windows Event Log parser with timeline view, severity filtering, and event statistics.
β
1,200+ Sigma Detection RulesCommunity-maintained Sigma rules bundled and applied during EVTX analysis for deep detection coverage.
β
Quick URL AnalysisInstant URL threat assessment - domain age, WHOIS data, TLD reputation - without a VM.
β
CSV & JSON ExportExport EVTX findings in CSV or JSON format for integration with other tools and workflows.
β
EVTX File DownloadDownload raw EVTX files from any session for analysis in external tools or evidence preservation.
β
Process Tree VisualizationInteractive process chain viewer with per-node enrichment. Network, file, registry, injection, and service activity mapped to each process with severity scoring and chain-aware filtering.
β
Bring Your Own LLMConnect your own API key from Anthropic, OpenAI, or Google for AI analysis. Keys encrypted locally with AES-256-CBC. Custom prompt instructions per analysis type.
π
Network & Privacy
Anonymous analysis with complete data sovereignty
β
Multi-Region VPN RoutingWireGuard exit nodes in the US, UK, Germany, and Spain. Malware C2 never sees your real IP.
β
VPN Kill SwitchHypervisor-level ACLs block all internet if the tunnel drops. The VM cannot bypass it.
β
100% Local ExecutionNo samples uploaded anywhere. All analysis happens on your hardware. Complete data privacy.
β
Direct ModeRun sessions without VPN when anonymity isn't required or for testing internal network scenarios.
π‘οΈ
Platform & Management
Everything that makes ThreatLab production-ready for your team
β
Web Management PortalLicense management, seat allocation, machine tracking, downloads, and documentation.
β
Built-in Issue ReportingReport issues directly from the app with optional log attachment. Detailed application logging to disk.