GET /api/techniques/151/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 151,
"key": "getforegroundwindow",
"unprotect_id": "U1301",
"name": "GetForegroundWindow",
"description": "This technique uses the GetForegroundWindow and Sleep APIs to attempt to evade sandboxes. Many sandboxes do not alter the foreground window like a user would in a normal desktop environment.\r\n\r\nIt accomplishes this by making a call to GetForegroundWindow, which returns a handle to the current window. Then the malware sample will sleep for a short time, followed by another call to GetForegroundWindow. If the foreground window has not changed, the malware assumes it is in a sandbox or analysis virtual machine and will continue this loop until the foreground window changes. If there is no change, the program will loop indefinitely or may make a call to ExitProcess.",
"windows": "",
"linux": "",
"macos": "",
"resources": "https://archive.f-secure.com/weblog/archives/00002810.html",
"creation_date": "2020-10-01T11:39:03Z",
"tags": "GetForegroundWindow",
"modification_date": "2023-10-04T10:42:43.425000Z",
"category": [
1
],
"rules": [],
"attachments": [],
"featured_api": [],
"contributors": []
}