ID | B0009 |
Objective(s) | Anti-Behavioral Analysis |
Related ATT&CK Techniques | Virtualization/Sandbox Evasion (T1497, T1633) |
Anti-Analysis Type | Detection |
Version | 2.4 |
Created | 1 August 2019 |
Last Modified | 27 December 2024 |
Malware checks whether it is being executed inside a virtual environment. In performing reconnaissance of its environment, the malware will check on a variety of user or system based artifacts. Examples include:
- monitoring for user action as reflected by scrolling
- verifying system characteristics through Windows Management Interface (WMI) queries, e.g., for MAC address
- observing whether tool artifacts represented by strings or processes exist, e.g., VirtualBox.exe or joeboxserver.exe
- checking specific registry keys or values [1]
Upon detection of the virtual machine, conditional execution will change the malware’s behavior. For example, execution may terminate, or activity may appear benign, e.g., connecting to a benign domain.
The related Virtualization/Sandbox Evasion (T1497, T1633) ATT&CK techniques were defined subsequent to this MBC behavior.
Name | ID | Description |
---|---|---|
Check File and Directory Artifacts | B0009.001 | Virtual machines create files on the file system (e.g., VMware creates files in the installation directory C:\Program Files\VMware\VMware Tools). Malware can check the different folders to find virtual machine artifacts (e.g., Virtualbox has the artifact VBoxMouse.sys). [2] |
Check Memory Artifacts | B0009.002 | VMware leaves many artifacts in memory. Some are critical processor structures, which, because they are either moved or changed on a virtual machine, leave recognizable footprints. Malware can search through physical memory for the strings VMware, commonly used to detect memory artifacts. [2] |
Check Named System Objects | B0009.003 | Virtual machines often include specific named system objects by default, such as Windows device drivers, which can be detected by testing for specific strings, whether found in the Windows registry or other places. |
Check Processes | B0009.004 | The VMware Tools use processes like VMwareServices.exe or VMwareTray.exe, to perform actions on the virtual environment. Malware can list the processes and searches for the VMware string. Processes related to Virtualbox can be detected by the malware by querying the process list. [2] This method is related to Unprotect technique U1334. |
Check Registry Keys | B0009.005 | Virtual machines register artifacts in the registry, which can be detected by malware. For example, a search for "VMware" or "VBOX" in the registry might reveal keys that include information about a virtual hard drive, adapters, running services, or a virtual mouse. [2] Example registry key value artifacts include "HARDWARE\Description\System (SystemBiosVersion) (VBOX)" and "SYSTEM\ControlSet001\Control\SystemInformation (SystemManufacturer) (VMWARE)"; example registry key artifacts include "SOFTWARE\VMware, Inc.\VMware Tools (VMWARE)" and "SOFTWARE\Oracle\VirtualBox Guest Additions (VBOX)". [5] |
Check Running Services | B0009.006 | VMwareService.exe runs the VMware Tools Service as a child of services.exe. It can be identified by listing services. [2] |
Check Software | B0009.007 | Malware may check software version; for example, to determine whether the software is relatively current. |
Check Virtual Devices | B0009.008 | The presence of virtual devices can indicate a virtualized environment (e.g., "\.\VBoxTrayIPC"). [5] |
Check Windows | B0009.009 | Malware may check windows for VM-related characteristics. |
Check Windows - Title bars | B0009.022 | Malware may check windows for VM-related characteristics. May inject malicious code to svchost.exe to check all open window title bar text to a list of strings indicating virtualized environment. |
Check Windows - Unique windows | B0009.021 | Malware may check windows for VM-related characteristics. May check for the presence of known windows from analysis tools running in a VM. |
Check Windows - Window size | B0009.020 | Malware may check windows for VM-related characteristics. Tiny window size may indicate a VM. |
Check Username or Hostname | B0009.039 | Malware checks for hostnames or session usernames that indicate the use of a virtual machine. |
Guest Process Testing | B0009.010 | Virtual machines offer guest additions that can be installed to add functionality such as clipboard sharing. Detecting the process responsible for these tasks, via its name or other methods, is a technique employed by malware for detecting whether it is being executed in a virtual machine. |
HTML5 Performance Object Check | B0009.011 | In three browser families, it is possible to extract the frequency of the Windows performance counter frequency, using standard HTML and Javascript. This value can then be used to detect whether the code is being executed in a virtual machine, by detecting two specific frequencies commonly used in virtual but not physical machines. |
Human User Check | B0009.012 | Detects whether there is any "user" activity on the machine, such as the movement of the mouse cursor, non-default wallpaper, or recently opened Office files. Directories or file might be counted. If there is no human activity, the machine is suspected to be a virtualized machine and/or sandbox. Other items used to detect a user: mouse clicks (single/double), DialogBox, scrolling, color of background pixel, change in foreground window [5]. This method is very similar to ATT&CK's Virtualization/Sandbox Evasion: User Activity Based Checks sub-technique. |
Instruction Testing | B0009.029 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] |
Instruction Testing - CPUID | B0009.034 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] Checking the CPU ID found within the registry can provide information to system type. This method is related to Unprotect technique U1324. |
Instruction Testing - IN | B0009.035 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] This method is related to Unprotect technique U1323. |
Instruction Testing - RDTSC | B0009.036 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] |
Instruction Testing - SGDT/SLDT (no pill) | B0009.031 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] The No Pill technique relies on the fact that the LDT structure is assigned to a processor not an Operating System. The LDT location on a host machine will be zero and on a virtual machine will be non-zero. This method is related to Unprotect technique U1327. |
Instruction Testing - SIDT (red pill) | B0009.030 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] Red Pill is an anti-VM technique that executes the SIDT instruction to grab the value of the IDTR register. The virtual machine monitor must relocate the guest's IDTR to avoid conflict with the host's IDTR. Since the virtual machine monitor is not notified when the virtual machine runs the SIDT instruction, the IDTR for the virtual machine is returned. This method is related to Unprotect technique U1328. |
Instruction Testing - SMSW | B0009.032 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] This method is related to Unprotect technique U1326. |
Instruction Testing - STR | B0009.033 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] This method is related to Unprotect technique U1325. |
Instruction Testing - VMCPUID | B0009.037 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] This method is related to Unprotect technique U1322. |
Instruction Testing - VPCEXT | B0009.038 | The execution of certain x86 instructions will result in different values when executed inside of a VM instead of on bare metal. Accordingly, these can be used to detect the execution of the malware in a VM. [2] This method is related to Unprotect technique U1321. |
Modern Specs Check | B0009.013 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. |
Modern Specs Check - Drive size | B0009.015 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Most modern machines have at least 80 GB disks. May use DeviceloControl (IOCTL_DISK_GET_LENGTH_INFO) or GetDiskFreeSpaceEx (TotalNumberOfBytes) [5]. This method is related to Unprotect technique U1312. |
Modern Specs Check - Keyboard layout | B0009.019 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Check keyboard layout. |
Modern Specs Check - Printer | B0009.017 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Checks whether there is a potential connected printer or default Windows printers; if not a virtual environment is suspected. This method is related to Unprotect technique U1309. |
Modern Specs Check - Processor count | B0009.018 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Checks number of processors; single CPU machines are suspect. This method is related to Unprotect technique U1340. |
Modern Specs Check - Total physical memory | B0009.014 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Most modern machines have at leave 4 GB of memory. (GlobalMemoryStatusEx) [5]. This method is related to Unprotect technique U1313. |
Modern Specs Check - USB drive | B0009.016 | Different aspects of the hardware are inspected to determine whether the machine has modern characteristics. A machine with substandard specifications indicates a virtual environment. Checks whether there is a potential USB drive; if not a virtual environment is suspected. This method is related to Unprotect technique U1310. |
Unique Hardware/Firmware Check | B0009.023 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. |
Unique Hardware/Firmware Check - BIOS | B0009.024 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. Characteristics of the BIOS, such as version, can indicate virtualization. |
Unique Hardware/Firmware Check - CPU Location | B0009.027 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. When an Operating System is virtualized, the CPU is relocated. [2] |
Unique Hardware/Firmware Check - CPU Name | B0009.026 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. Checks the CPU name to determine virtualization. |
Unique Hardware/Firmware Check - I/O Communication Port | B0009.025 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. VMware uses virtual I/O ports for communication between the virtual machine and the host operating system to support functionality like copy and paste between the two systems. The port can be queried and compared with a magic number VMXh to identify the use of VMware. This method is related to Unprotect technique U1336. |
Unique Hardware/Firmware Check - MAC Address | B0009.028 | Malware may check for hardware characteristics unique to being virtualized, allowing the malware to detect the virtual environment. VMware uses specific virtual MAC address that can be detected. The usual MAC address used started with the following numbers: "00:0C:29", "00:1C:14", "00:50:56", "00:05:69". Virtualbox uses specific virtual MAC address that can be detected by Malware. The usual MAC address used started with the following numbers: 08:00:27. [2] This method is related to Unprotect technique U1335. |
Name | Date | Method | Description |
---|---|---|---|
GravityRAT | 2018 | -- | GravityRAT checks system temperature by recording thermal readings for detecting VMs. Heat levels indicate whether the system is a VM. [3] |
GravityRAT | 2018 | B0009.018 | GravityRAT determines the machine is a VM if the core count is 1. [3] |
GravityRAT | 2018 | B0009.023 | GravityRAT checks if the manufacturer field in the Win32_Computer entry (in WMI) contains "Virtual," "Vmware," or "Virtualbox." [3] |
GravityRAT | 2018 | B0009.024 | GravityRAT creates a WMI request to identify the BIOS version. [13] |
GravityRAT | 2018 | B0009.028 | GravityRAT checks if the MAC address starts with a well-known hexadecimal number used by various VM developers. [3] |
WebCobra | 2018 | B0009.022 | WebCobra injects malicious code in to svchost.exe and uses an infinite loop to check all open windows and to compare each window’s title bar text with a set of strings to determine whether it is running in a VM. [4] |
Redhip | 2011 | -- | Redhip detects VMWare, Virtual PC, and Virtual Box. It also detects VM environments in general by considering time lapses. [6] |
Emotet | 2018 | B0009.010 | Emotet checks for various processes that are associated with various virtual machines by comparing hash values of the process names with the hash values of the list of running process names. [7] |
Vobfus | 2016 | -- | Vobfus checks for the presence of virtualization software by querying the system registry. [8] |
Matanbuchus | 2021 | B0009.003 | Malware checks if it is running in a sandbox. If it is, the malware exits. [9] [10] |
Ursnif | 2016 | B0009.004 | The malware checks if there are virtual machine processes running (Vbox, vmware, etc). [11] |
Dark Comet | 2008 | B0009.012 | The malware checks for an unmoving mouse cursor. [12] |
Tool: capa | Mapping | APIs |
---|---|---|
check for sandbox and av modules | Virtual Machine Detection (B0009) | GetModuleHandle |
check for Windows sandbox via genuine state | Virtual Machine Detection (B0009) | SLIsGenuineLocal, UuidFromString |
reference anti-VM strings targeting Parallels | Virtual Machine Detection (B0009) | -- |
check for unmoving mouse cursor | Virtual Machine Detection::Human User Check (B0009.012) | -- |
reference anti-VM strings targeting VirtualPC | Virtual Machine Detection (B0009) | -- |
reference anti-VM strings targeting VMWare | Virtual Machine Detection (B0009) | -- |
check for foreground window switch | Virtual Machine Detection::Human User Check (B0009.012) | Sleep |
detect VM via disk hardware WMI queries | Virtual Machine Detection::Unique Hardware/Firmware Check (B0009.023) | -- |
reference anti-VM strings targeting Qemu | Virtual Machine Detection (B0009) | -- |
reference anti-VM strings targeting Xen | Virtual Machine Detection (B0009) | -- |
check for sandbox username or hostname | Virtual Machine Detection (B0009) | -- |
check for Windows sandbox via process name | Virtual Machine Detection (B0009) | -- |
check for Windows sandbox via dns suffix | Virtual Machine Detection (B0009) | GetAdaptersAddresses |
check for Windows sandbox via device | Virtual Machine Detection (B0009) | -- |
reference anti-VM strings targeting VirtualBox | Virtual Machine Detection (B0009) | -- |
check for Windows sandbox via registry | Virtual Machine Detection (B0009) | RegOpenKeyEx, RegEnumValue |
reference anti-VM strings | Virtual Machine Detection (B0009) | -- |
Tool: CAPE | Mapping | APIs |
---|---|---|
antivm_generic_disk | Virtual Machine Detection (B0009) | DeviceIoControl, NtClose, NtCreateFile, NtDuplicateObject, NtOpenFile, NtDeviceIoControlFile |
antivm_generic_disk | Virtual Machine Detection::Modern Specs Check - Drive size (B0009.015) | DeviceIoControl, NtClose, NtCreateFile, NtDuplicateObject, NtOpenFile, NtDeviceIoControlFile |
antivm_vpc_mutex | Virtual Machine Detection (B0009) | -- |
antivm_directory_objects | Virtual Machine Detection (B0009) | NtQueryDirectoryObject, NtOpenDirectoryObject |
antivm_directory_objects | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | NtQueryDirectoryObject, NtOpenDirectoryObject |
antivm_network_adapters | Virtual Machine Detection (B0009) | GetAdaptersAddresses |
antivm_generic_cpu | Virtual Machine Detection (B0009) | -- |
antivm_generic_cpu | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_generic_cpu | Virtual Machine Detection::Unique Hardware/Firmware Check - BIOS (B0009.024) | -- |
antivm_vbox_provname | Virtual Machine Detection (B0009) | WNetGetProviderNameW |
antivm_vbox_provname | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | WNetGetProviderNameW |
antivm_generic_bios | Virtual Machine Detection (B0009) | -- |
antivm_generic_bios | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_generic_bios | Virtual Machine Detection::Unique Hardware/Firmware Check - BIOS (B0009.024) | -- |
antivm_vbox_keys | Virtual Machine Detection (B0009) | -- |
antivm_vbox_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vmware_events | Virtual Machine Detection (B0009) | NtOpenEvent, NtCreateEvent |
antivm_vbox_devices | Virtual Machine Detection (B0009) | -- |
antivm_vbox_devices | Virtual Machine Detection::Check Virtual Devices (B0009.008) | -- |
antivm_vmware_devices | Virtual Machine Detection (B0009) | -- |
antivm_vmware_devices | Virtual Machine Detection::Check Virtual Devices (B0009.008) | -- |
antivm_hyperv_keys | Virtual Machine Detection (B0009) | -- |
antivm_hyperv_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vbox_files | Virtual Machine Detection (B0009) | -- |
antivm_vbox_files | Virtual Machine Detection::Check Virtual Devices (B0009.008) | -- |
antisandbox_mouse_hook | Virtual Machine Detection (B0009) | SetWindowsHookExA, SetWindowsHookExW |
antisandbox_mouse_hook | Virtual Machine Detection::Human User Check (B0009.012) | SetWindowsHookExA, SetWindowsHookExW |
antivm_generic_scsi | Virtual Machine Detection (B0009) | RegOpenKeyExW, RegQueryValueExA, RegQueryValueExW, RegOpenKeyExA |
antivm_generic_scsi | Virtual Machine Detection::Check Registry Keys (B0009.005) | RegOpenKeyExW, RegQueryValueExA, RegQueryValueExW, RegOpenKeyExA |
antivm_vmware_libs | Virtual Machine Detection (B0009) | LdrLoadDll |
antivm_vmware_libs | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | LdrLoadDll |
antivm_xen_keys | Virtual Machine Detection (B0009) | -- |
antivm_xen_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_parallels_keys | Virtual Machine Detection (B0009) | -- |
antivm_parallels_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_generic_diskreg | Virtual Machine Detection (B0009) | -- |
antivm_generic_diskreg | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vpc_keys | Virtual Machine Detection (B0009) | -- |
antivm_vpc_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_bochs_keys | Virtual Machine Detection (B0009) | -- |
antivm_bochs_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vpc_files | Virtual Machine Detection (B0009) | -- |
antivm_vpc_files | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | -- |
antivm_vmware_mutexes | Virtual Machine Detection (B0009) | -- |
antivm_vbox_libs | Virtual Machine Detection (B0009) | LdrLoadDll |
antivm_vbox_libs | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | LdrLoadDll |
antivm_generic_system | Virtual Machine Detection (B0009) | -- |
antivm_generic_system | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vmware_files | Virtual Machine Detection (B0009) | -- |
antivm_vmware_files | Virtual Machine Detection::Check File and Directory Artifacts (B0009.001) | -- |
antivm_generic_services | Virtual Machine Detection::Check Registry Keys (B0009.005) | RegOpenKeyExW, RegEnumKeyExW, RegEnumKeyExA, RegOpenKeyExA |
antivm_generic_services | Virtual Machine Detection::Check Running Services (B0009.006) | RegOpenKeyExW, RegEnumKeyExW, RegEnumKeyExA, RegOpenKeyExA |
antivm_generic_disk_setupapi | Virtual Machine Detection (B0009) | SetupDiGetClassDevsA, SetupDiGetClassDevsW |
antisandbox_sboxie_objects | Virtual Machine Detection (B0009) | NtOpenDirectoryObject |
antivm_vmware_keys | Virtual Machine Detection (B0009) | -- |
antivm_vmware_keys | Virtual Machine Detection::Check Registry Keys (B0009.005) | -- |
antivm_vbox_window | Virtual Machine Detection (B0009) | -- |
antivm_vbox_window | Virtual Machine Detection::Check Windows (B0009.009) | -- |
Virtual Machine Detection::Instruction Testing
SHA256: cfaf863181e49906df33f9104795678f2fb41a007a8fd066a84fd99f613d7ef3asm ; ___unwind { // __except handler4 push ebp mov ebp, esp push 0FFFFFFFEh push offset stru_413980 push offset __except handler4 mov eax, large fs:0 push eax sub esp, 14h push ebx push esi push edi mov eax, ___security_cookie xor [epb+ms_exc.registration.ScopeTable], eax xor eax, ebp push eax lea eax, [ebp+ms_exc.registration] mov large fs:0 eax mov [ebp+var_19], al ; __try { // __except at loc_401CB8 mov [ebp+ms_exc.registration.TryLevel], eax push ebx mov ebx, 0 mov eax, 1 vpcext 7, 08h test ebx, ebx setz [ebp+var_19] pop ebx jmp short loc_401CBB
[1] Check Point Research,"CP: Evasion Techniques," evasions.checkpoint.com, [Online]. Available: https://evasions.checkpoint.com.
[2] https://search.unprotect.it/category/sandbox-evasion/
[3] https://blog.talosintelligence.com/2018/04/gravityrat-two-year-evolution-of-apt.html
[4] https://www.mcafee.com/blogs/other-blogs/mcafee-labs/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency/
[5] https://github.com/LordNoteworthy/al-khaser
[6] https://web.archive.org/web/20161025013916/https://web.archive.org/web/20200815134441/https://www.fireeye.com/blog/threat-research/2011/01/the-dead-giveaways-of-vm-aware-malware.html
[7] https://securelist.com/the-banking-trojan-emotet-detailed-analysis/69560/
[8] https://securitynews.sonicwall.com/xmlpost/revisiting-vobfus-worm-mar-8-2013/
[9] https://www.0ffset.net/reverse-engineering/matanbuchus-loader-analysis/
[10] https://www.cyberark.com/resources/threat-research-blog/inside-matanbuchus-a-quirky-loader
[11] https://www.proofpoint.com/us/threat-insight/post/ursnif-banking-trojan-campaign-sandbox-evasion-techniques
[12] capa v4.0, analyzed at MITRE on 10/12/2022
[12] https://www.hackread.com/gravityrat-malware-evades-detection-targets-india/