BuildCommDCBAndTimeoutA

This technique uses a BuildCommDCBAndTimeoutsA API call to determine if the malware is detonating in a sandbox. Normally, a bogus device string would cause this API call to fail. However, some malware sandbox environments may emulate in a way that allows the API call to succeed even when given a bogus device string.


Technique Identifiers

U1342 T1497.002

Evasion Categories

Code Snippets

Detection Rules

Contributor

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
al-khaser.exe 24 2024-11-13 1 year, 4 months ago
View All

Created

March 20, 2024

Last Revised

March 24, 2026