Kernova — Stealth Sandbox

Run Windows applications inside a believable, contained environment with forensic-grade observability — file and registry I/O, process lifecycle, network attempts, and memory snapshots — while keeping the host safe. Designed for native-like execution that’s indistinguishable from the host with near‑lossless performance.

Quick Summary

Kernova provides the sweet spot between authenticity and control: a sandbox that preserves a program’s normal view of a Windows host while giving the analyst full visibility, containment, and replayability.

Implementation & Languages

Kernova will be implemented primarily in C for predictable performance, small binaries and direct control over OS interfaces. Select components will use assembly where low-level hooks, syscall stubs or highly tuned hot paths are warranted.

Core runtime (C): launcher/controller, environment mirror, event bus, and artifact management built in C for portability and tight control.

Instrumentation (C): file/registry/process/network instrumentation using well-defined OS APIs, minimizing footprint and preserving timing.

Targeted assembly: minimal, localized routines for syscall shims, context capture, and fast-path probes where C isn’t granular enough.

Interop boundaries: clean interfaces between C modules and any assembly stubs to maintain readability and testability.

Build & Portability

Prefer a straightforward build toolchain with clear targets for the launcher, instrumentation libraries, and optional helpers. Keep code isolated behind feature flags and clear abstraction layers.

  • Static analysis: enable warnings-as-errors and sanitizers in dev builds.
  • Artifacts: deterministic builds where possible; symbol maps for debug builds only.
  • Testing: unit tests for event schema and redirection logic; replay-based integration checks.

Overview

Kernova is a stealthy, high-fidelity sandbox for Windows apps. It mirrors a realistic host environment so targets behave authentically — often indistinguishable from running on the host — while side effects are routed into an isolated image with deep, structured telemetry and near‑lossless performance.

Kernova offers realistic environment fidelity to reduce sandbox detection, granular observability across file, registry, process, network, and memory, strong containment so writes never touch the real host, and repeatable runs with replay and diffing across configurations.

The Problem

Lightweight sandboxes can change behaviour or get detected; full VMs are heavy and difficult to instrument. Kernova aims for the middle ground: believable fidelity + deep observability + strong containment for safe, insightful analysis.

What It Does

Contained Execution

Launch a Windows executable inside a contained runtime that mirrors the host. All writes are redirected into a sandbox image.

Deep Telemetry

Log file/registry I/O, process/thread lifecycle, module loads, and network attempts to a structured, timestamped event store.

Memory Snapshots

Capture memory states at start, periodic intervals, end, or on-demand. Link snapshots into the event timeline for forensics.

Network Gate

Allow, block, or proxy outbound connections. Provide synthetic or recorded responses to coax behaviour without Internet access.

Replay & Compare

Re-run targets under saved environments and diff timelines to highlight behavioural changes across configurations.

Practical UX

Drag-and-drop launching, live timeline, filters, and quick export/reporting to keep analysis fast and repeatable.

Key Benefits

Authenticity

Targets see a believable host — execution feels native and near‑lossless, increasing the chance of normal behaviour.

Visibility

Detailed event timelines and memory captures enable precise, forensic analysis.

Safety & Control

Side effects are contained; network paths are explicitly governed by rules.

Architecture (Conceptual)

Launcher / Controller

Orchestrates runs: configuration, environment snapshot, launch, monitoring, and shutdown. Stores run metadata and annotations.

Environment Mirror

Presents a localized view of filesystem, registry, and visible services. Redirects writes into the sandbox image.

Observation & Event Bus

Collects file, process, module, and network events as structured records with timestamps and context.

Memory Snapshotter

Captures process memory at configured points; snapshots are catalogued and linked to the timeline.

Network Gate / Proxy

Controls outbound connections: allow, block, or proxy. Supports canned responses to simulate services.

Replay & Comparison

Replays event sequences or re-runs under saved environments to compute diffs between runs.

User Interface

Live timeline with filters, snapshot browser, and export/report tools. CLI for automation.

Data Flows

  1. Configure & Launch

    User configuration is applied; the Launcher creates an isolated environment snapshot and starts the run.

  2. Instrument & Collect

    Hooks emit structured events which the Event Bus timestamps and aggregates.

  3. Contain Side Effects

    File and registry writes are redirected into the sandbox image; logs record virtual paths and outcomes.

  4. Gate Networking

    Network calls traverse the Network Gate where allow/block/proxy rules are applied and logged.

  5. Snapshot Memory

    Memory snapshots are captured at configured points and stored as artifacts linked into the timeline.

  6. Review & Replay

    After shutdown, artifacts and timeline are available for review, export, or replay for comparison.

Event Types

File
open, read, write, delete, rename
Registry
key read, write, create, delete
Process
spawn, exit, loaded modules
Network
connections, DNS requests, HTTP endpoints
Memory
snapshot markers, regions of interest
Anomalies
crashes, violations, suspicious patterns

Abstraction & Fidelity Strategy

Keep the surface area close to a real Windows host at the chosen fidelity level (filesystem layout, common registry keys, expected services). Route side-effecting operations into ephemeral or versioned images so each run starts clean.

Prefer proxies and canned responses to simulate services. Instrumentation should be structured and minimally invasive to preserve observable timing and behaviour.

Build Plan & Phases

Phase 0 — Design & Prototypes

Define run configuration and event schema. Mock UI flows and prototype sandbox image format and metadata store.

Phase 1 — MVP

Overlay filesystem containment; basic file and process logging; simple GUI timeline.

Phase 2 — Networking & Snapshots

Network rules and logging; memory snapshots linked to the timeline; richer logging schema.

Phase 3 — Replay & Comparison

Automatic replay under saved environments and timeline diffing; side-by-side comparisons.

Phase 4 — UX & Hardening

Filters, search, export templates, report generator; containment hardening and optional canned services.

MVP Checklist

  • Launch config + run metadata
  • Sandboxed filesystem overlay
  • File and process event logging
  • GUI timeline and event viewer
  • Exportable run logs and artifacts
  • Simple network rules (allow/block/proxy)

Demo Plan

  • Show UI and prepared run config
  • Drag benign binary and start run
  • Live timeline: file write, process spawn, network attempt
  • Open a memory snapshot linked in time
  • Re-run with network blocked and show diff
  • Export a run report

Follow progress on GitHub

Open Repository