Skip to content

Latest commit

 

History

History
71 lines (58 loc) · 3.36 KB

emulator-detection.md

File metadata and controls

71 lines (58 loc) · 3.36 KB
ID B0004
Objective(s) Anti-Behavioral Analysis
Related ATT&CK Techniques None
Anti-Analysis Type Detection
Version 2.2
Created 1 August 2019
Last Modified 27 April 2024

Emulator Detection

Detects whether the malware instance is being executed inside an emulator. If so, conditional execution selects a benign execution path.

Methods

Name ID Description
Check Emulator-related Registry Keys B0004.003 Emulators register artifacts in the registry, which can be detected by malware. For example, installation of QEMU results in the registry key: HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 with value=Identifier and data=QEMU, or registry key: HARDWARE\Description\System with value=SystemBiosVersion and data=QEMU. [1]
Check for Emulator-related Files B0004.001 Checks whether particular files (e.g., QEMU files) exist.
Check for WINE Version B0004.002 Checks for WINE via the get_wine_version function from WINE's ntdll.dll.
Failed Network Connections B0004.004 Some emulated systems fail to handle some network communications; such failures will indicate the emulated environment.

Use in Malware

Name Date Method Description
Stuxnet 2010 -- Stuxnet checks for specific operating systems on 32-bit machines, registry keys, and dates to profile a potential target machine before execution. If the conditions are not met to be considered a viable target, it will exit execution. [2]

Detection

Tool: capa Mapping APIs
check if process is running under wine Emulator Detection (B0004) GetModuleHandle, GetProcAddress
Tool: CAPE Mapping APIs
antiemu_windefend Emulator Detection (B0004) --
antivm_bochs_keys Emulator Detection (B0004) --
antivm_bochs_keys Emulator Detection::Check Emulator-related Registry Keys (B0004.003) --
antiemu_wine_func Emulator Detection (B0004) LdrGetProcedureAddress
antiemu_wine_reg Emulator Detection (B0004) --
antiemu_wine_reg Emulator Detection::Check Emulator-related Registry Keys (B0004.003) --

References

[1] https://search.unprotect.it/category/sandbox-evasion/

[2] https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en