GET /api/techniques/367/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 367,
"key": "buildcommdcbandtimeouta",
"unprotect_id": "U1342, T1497.002",
"name": "BuildCommDCBAndTimeoutA",
"description": "This technique uses a `BuildCommDCBAndTimeoutsA` API call to determine if the malware is detonating in a sandbox. Normally, a bogus device string would cause this API call to fail. However, some malware sandbox environments may emulate in a way that allows the API call to succeed even when given a bogus device string.",
"windows": "",
"linux": "",
"macos": "",
"resources": "",
"creation_date": "2024-03-20T00:00:50.060144Z",
"tags": "BuildCommDCBAndTimeoutsA, sandbox evasion",
"modification_date": "2024-03-20T00:10:09.498989Z",
"category": [
1
],
"rules": [
156
],
"attachments": [],
"featured_api": [],
"contributors": [
35
]
}