Skip to content

Latest commit

 

History

History
63 lines (50 loc) · 2.33 KB

emulator-detection.md

File metadata and controls

63 lines (50 loc) · 2.33 KB
ID B0004
Objective(s) Anti-Behavioral Analysis
Related ATT&CK Techniques None
Anti-Analysis Type Detection
Version 2.0
Created 1 August 2019
Last Modified 19 September 2023

Emulator Detection

Detects whether the malware instance is being executed inside an emulator. If so, conditional execution selects a benign execution path.

Methods

Name ID Description
Check Emulator-related Registry Keys B0004.003 Emulators register artifacts in the registry, which can be detected by malware. For example, installation of QEMU results in the registry key: HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 with value=Identifier and data=QEMU, or registry key: HARDWARE\Description\System with value=SystemBiosVersion and data=QEMU. [1]
Check for Emulator-related Files B0004.001 Checks whether particular files (e.g., QEMU files) exist.
Check for WINE Version B0004.002 Checks for WINE via the get_wine_version function from WINE's ntdll.dll.
Failed Network Connections B0004.004 Some emulated systems fail to handle some network communications; such failures will indicate the emulated environment.

Use in Malware

Name Date Method Description
Stuxnet 2010 -- Stuxnet checks for specific operating systems on 32-bit machines, registry keys, and dates to profile a potential target machine before execution. If the conditions are not met to be considered a viable target, it will exit execution. [2]

Detection

Tool: capa Mapping APIs
check if process is running under wine Emulator Detection (B0004) GetModuleHandle, GetProcAddress

References

[1] https://search.unprotect.it/category/sandbox-evasion/

[2] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en