(CAPA) Check Sandbox Process

Download Raw

rule:
  meta:
    name: check for windows sandbox via process name
    namespace: anti-analysis/anti-vm/vm-detection
    authors:
      - "@_re_fox"
    scope: function
    att&ck:
      - Defense Evasion::Virtualization/Sandbox Evasion::System Checks [T1497.001]
    mbc:
      - Anti-Behavioral Analysis::Virtual Machine Detection [B0009]
    references:
      - https://github.com/LloydLabs/wsb-detect
    examples:
      - 773290480d5445f11d3dc1b800728966:0x140001140
  features:
    - and:
      - match: enumerate processes
      - string: "CExecSvc.exe"

Associated Techniques

Technique Name Technique ID's Snippet(s) OS
Detecting Running Process: EnumProcess API U0109 U0405 U1306

Created

June 28, 2022

Last Revised

November 13, 2024