Reference

http://joe4security.blogspot.kr/2012/08/vm-and-sandbox-detections-become-more.html

http://ghostshell.tistory.com/293

https://gitlab.pluribusgames.com/mirrors/metasploit-framework/raw/ddb98715776e6d49443d26816cbc9db54b093e81/modules/post/windows/gather/checkvm.rb

http://thisissecurity.net/2014/08/20/win32atrax-a/


Registry Query

1. "HKLM\HARDWARE\Description\System\\SystemBiosVersion". 

- vbox 문자열 확인


2. "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\\ProductID" and 
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\\ProductID". 
 

- Product ID 확인 55274-640-2673064-23950 (JoeBox) 76487-644-3177037-23510 (CWSandBox) 76487-337-8429955-22614 (Anubis)


3. HKLM\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus

0\Target Id 0\Logical Unit Id 0\\Identifier

- Identifier의 Value가 vmware, vbox 인지 확인



Registry Enum

1. HKLM\SOFTWARE\Microsoft

- Hyper-V, VirtualMachine 확인


2. HKLM\SYSTEM\ControlSet001\Services

- vmicheartbeat, vmicvss, vmicshutdown, vmicexchange, vmci, vmdebug, vmmouse, VMTools, VMMEMCTL, vmware, vmx86, vpcbus, vpc-s3, vpcuhub, msvmmouf, VBoxMouse, VBoxGuest, VBoxGuest, VBoxSF, xenevtchn, xennet, xennet6, xensvc, xenvdb,


3. "HKLM\HARDWARE\ACPI\DSDT"

"HKLM\HARDWARE\ACPI\FADT" "HKLM\HARDWARE\ACPI\RSDT"

- VBOX (VirtualBox)

- XEN

- PTLTD(VmWare)

- AMIBI (Virtual PC)


Process Snapshot

1. 아래의 프로세스 목록 확인

- vmware, vmount2, vmusrvc, vmsrvc, VBoxService, vboxtray, xenservice, joeboxserver, joeboxcontrol, wireshark, sniff_hit, sysAnalyzer, filemon, procexp, procmon, regmon, autoruns



Files Check

1. 아래의 파일 목록 확인

- hgfs.sys, vmhgfs.sys, prleth.sys, prlfs.sys, prlmouse.sys, prlvideo.sys, prl_pv32.sys, vpc-s3.sys, vmsrvc.sys, vmx86.sys, vmnet.sys



Modules Check

1. 아래의 모듈 목록 확인 (DLL)

- dbghelp, SbieDll, api_log, dir_watch, pstorec


Users Check

1. 아래의 사용자 이름 목록 확인

currentuser, sandbox, honey, vmware, nepenthes, snort, andy, roo



Computer Name Check

1. 아래의 컴퓨터 이름 목록 확인

TU-4NH09SMCG1HC








+ Recent posts