Instrumented Virtual Machine
A fully instrumented VM is prepared for each run, equipped with SentinelOne, ArmorX, Sysmon, and internal network taps. All components are synchronized to record precise timing and behavior across the system.
Malware Lab
The Replay Malware Lab provides a fully isolated and instrumented environment where real malicious code can be executed, observed, and captured without any risk to production systems.
Each detonation generates a complete, time accurate record of system behavior across SentinelOne, ArmorX, Sysmon, and network sensors. After each run, the environment is destroyed and rebuilt, ensuring a clean and controlled workspace for every scenario.
Replay uses a sealed virtual environment positioned behind a containment firewall. No outbound communication is allowed except for the security agents that report telemetry.
This guarantees safe execution while capturing every observable action of the malware.
A fully instrumented VM is prepared for each run, equipped with SentinelOne, ArmorX, Sysmon, and internal network taps. All components are synchronized to record precise timing and behavior across the system.
Malicious code is introduced and executed under strict supervision. Containment checks, approval workflows, and execution controls ensure that the malware cannot escape the environment.
Every action generated by the malware is recorded. This includes endpoint telemetry, host level artifacts, EDR analytics, network traces, and system events. Replay collects and aligns these signals through the Fluency event pipeline.
Once execution is complete, the VM is destroyed. Captured telemetry is sanitized, masked, and packaged into a portable Replay scenario that can be replayed as often as needed.
Replay users gain access to authentic malicious behavior that reflects how real infections unfold.
These scenarios provide:
These captures produce more accurate learning and testing environments than synthetic samples or vendor provided demonstrations.
After packaging, each malware run behaves like a real incident inside Fluency.
Dashboards show aligned behavior across:
SentinelOne
Endpoint detection and response activity
Sysmon
System level processes, registry, and file operations
ArmorX
Advanced threat analysis and enrichment
Network Indicators
Flow data, connection attempts, and unusual traffic patterns
This correlation gives students and analysts a complete view of how a threat progresses and how each tool contributes to detection and response.
Every detonation becomes a new scenario available in Replay.
As the lab expands, the scenario library provides broader coverage of threat families and behaviors, including:
The library continues to grow as new samples and techniques are detonated, offering ever increasing depth and variety.
Replay Integration
Each scenario preserves timing, sequencing, and behavior from the original run, allowing instructors and analysts to demonstrate how Fluency correlates multi source telemetry, replay attacks exactly as they occurred, build instructor led exercises and workbook sessions, and test new rules, detections, or AI workflows with consistent inputs.
Replay transforms each lab execution into a practical, reusable asset.
Coming Enhancements
Future updates will include visualization of the containment architecture, screenshots and environment views from inside the lab, request forms for custom malware runs, and curated scenario bundles organized by threat category.