Detecting Virtual Environment Artefacts

Malware often checks for artifacts left by virtualization platforms to determine if it is running inside a virtual environment. Detecting such artifacts allows the malware to adapt its behavior, delay execution, or avoid exposing malicious functionality during analysis.

  • QEMU: QEMU registers artifacts in the Windows registry. For example, the key HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 contains the value Identifier with data QEMU. Another check is the key HARDWARE\Description\System with the value SystemBiosVersion and data QEMU.

  • VirtualBox: The VirtualBox Guest Additions leave multiple registry artifacts. Searching the registry for the string VBOX often reveals keys that expose the presence of VirtualBox.

  • VMware (Registry & Files): VMware installs tools in C:\Program Files\VMware\VMware Tools, and related registry entries may also contain information about the virtual hard drive, network adapters, or virtual mouse. Searching the registry for VMware can reveal these indicators.

  • VMware (Memory): VMware also leaves artifacts in memory. Critical processor structures may be moved or altered inside a VM, leaving recognizable footprints. Malware can scan physical memory for strings such as VMware to confirm that it is running in a virtualized environment.


Technique Identifier

U1332

Evasion Categories

Code Snippets

Detection Rules

Additional Resources

External Links
The resources provided below are associated links that will give you even more detailed information and research on current evasion technique. It is important to note that, while these resources may be helpful, it is important to exercise caution when following external links. As always, be careful when clicking on links from unknown sources, as they may lead to malicious content.

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
FilterKeysSetter.exe 5 2026-03-28 2 hours, 27 minutes ago
LEGO Voyagers installer.exe 4 2026-03-25 2 days, 21 hours ago
rootkit.exe 10 2026-03-24 3 days, 18 hours ago
rlm1611_http.dll 6 2025-11-22 4 days, 19 hours ago
hello.exe 6 2026-03-18 1 week, 2 days ago
Crane3d.exe 2 2026-03-16 1 week, 4 days ago
mirroringApp-car-v1.0.2310071810 (1).apk 3 2024-11-14 2 weeks, 1 day ago
548964a6ea3d573cfae71aa5e2d0...0fc323c6432e96d2ad55b80d.exe 7 2026-03-04 3 weeks, 2 days ago
AION.exe 5 2026-03-03 3 weeks, 3 days ago
passper-for-rar_setup-com_passper.exe 8 2026-02-18 1 month, 1 week ago
View All

Created

March 11, 2019

Last Revised

March 24, 2026