BuildCommDCBAndTimeoutA
This technique uses a BuildCommDCBAndTimeoutsA API call to determine if the malware is detonating in a sandbox. Normally, a bogus device string would cause this API call to fail. However, some malware sandbox environments may emulate in a way that allows the API call to succeed even when given a bogus device string.
Technique Tags
Evasion Categories
Code Snippets
Detection Rules
Contributor
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| al-khaser.exe | 24 | 2024-11-13 | 1 year, 4 months ago |
Created
March 20, 2024
Last Revised
March 24, 2026