Virtualization-based sandbox malware | Infosec (2024)

Malware analysis

Introduction

Sandboxing is well known for its ability to execute code safely without potential malicious effects afflicting a system. They are normally used when testing out how programs and applications will react in an environment and any other time that you want to test the trustworthiness of code. But many may not know that there are two different types of sandboxing, and they are not created equal.

This article will detail virtualization-based malware and explore: the differences between virtualized and emulated malware, virtualization-based sandbox malware generally and the three different techniques that malware use to evade virtualization-based malware. We’ll give a rundown of some of the different malware and malware families that take advantage of virtualization-based sandbox vulnerabilities.

Virtualization-based versus emulated sandboxing

Sandboxes are typically used to detect malware and the relative safety of code. However, advanced malware and malware families can evade both mainline consumers and next-generation sandboxes. This applies to virtualization-based sandboxes, or sandboxes running on virtual machines.

Emulated sandboxes are where the entire system is emulated — from memory to CPU to I/O devices. It offers the greatest stealth visibility of what occurs within programs and applications. Virtualization-based sandboxing offers less stealth (as malware can easily detect the hypervisor and then hide their malicious actions) and offers less visibility within programs and applications. This is a major shortcoming for virtualization-based sandboxing.

Virtualization-based sandbox malware

Advanced malware can detect whether it is executed or running within a sandbox. When it detects a sandbox, it will simply avoid taking malicious action and will successfully evade detection. The sandbox will then erroneously label the file as benign and will be allowed onto the network.

Without detecting that it is in a sandbox, the malware will just proceed as normally and perform malicious actions. The key here is to not allow detection so if it is malware, you can see it for what it actually is.

Virtualization-based sandboxes cannot evade detection because the malware can detect virtual machine environments such as VMware, Xen and KVM. When this “guest” operating system (OS) is running on top of a “host” OS, it inserts artifacts onto the host system. Some of these artifacts include OS system files, processes, additional CPU features and other elements required for virtualization. These artifacts are the tell-tale signs advanced malware looks for when detecting sandbox or VM presence and is one of the techniques explored.

Techniques to avoid virtualization-based sandboxes

There are three techniques that advanced malware uses to avoid virtualization-based sandboxes.

Virtual machine artifacts discovery

As mentioned earlier, VMs often include artifacts that leave clues about their presence on a system. You can think of them as a trail of breadcrumbs that malware can use to spot a virtualization-based sandbox. There are a number of different breadcrumb trails attackers can use, including:

  • The presence of VM tools: For example, if you are using VMware, your system may have over 50 references to VMware in its system files
  • Specific hardware parameters unique to either VM or real physical environments: These can be found querying serial numbers or values attributed to processors, motherboards and so on
  • Registry keys can contain large volumes of values that only virtual systems use: VMware can store over 300 references to VMware
  • Specific system memory structures may be located in different areas for VM environments, including Interrupt Descriptor Table (IDT)
  • Identifying the virtual network adapter’s MAC address or BIOS serial number: VMware is associated with MAD addresses beginning with 00-05-69, 00-0c-29, 00-1c-14 or 00-50-56

User activity discovery

User activity on the host, including browser bookmarks, history, cache and so on, may be indicative of an authentic environment.

Malware can also detect user activity by referring to user interaction and digital signatures. User activity can be determined by using the frequency and speed of mouse clicks — sandboxed environments will have as many. Other evidence can be gleaned from specific user interaction such as interaction with the system that precedes malicious code activation. An example of this is the time it takes for a user to activate malicious code by double-clicking on an embedded image.

Virtual hardware fingerprinting discovery

Attackers can check the system temperature and the fan to determine whether the environment is physical. A CPU check of a system fan can be performed with a WMI query of $q = “Select * from Win32_Fan” Get-WmiObject -Query $q. If the results return zero elements, the machine is likely virtual.

Examples of virtualization-based sandbox malware

There are many different examples of malware that can evade virtualization-based sandboxes. The following examples of malware use the techniques listed above.

  • BadPatch
  • CHOPSTICK
  • CozyCar
  • Dyre
  • EvilBunny
  • FIN7
  • FinFisher
  • GravityRAT
  • HAWKBALL
  • OopsIE
  • OSX_OCEANLOTUS.D
  • PlugX
  • Pupy
  • Remcos
  • RogueRobin
  • ROKRAT
  • Smoke Loader
  • SynAck
  • UBoatRAT
  • Ursnif
  • yty

Mitigation and detection

Virtualization-based sandbox malware cannot be mitigated easily because it uses abuses of system features. To remove this ability from malware would essentially require turning off the system’s ability to use virtual environments. You also cannot easily detect this type of malware but monitoring your system for suspicious processes that gather system information for discovery in a short time period may help.

Conclusion

Sandboxes are normally used in part to verify whether an application, program, executable or just a piece of code is malicious. Attackers know this and can effectively evade virtualization-based sandboxes, making it easier to gain entry to a target system. By using emulated sandboxes, you can bypass this vulnerability and better avoid the malware listed above.

Sources

  1. Virtualization-Based Sandboxes are Vulnerable to Advanced Malware, Lastline
  2. Virtualization/Sandbox Evasion, MITRE ATT&CK
  3. Sandbox Architectures — Which One is Best at Detecting Malware?, Lastline

Posted: March 11, 2020

Virtualization-based sandbox malware | Infosec (3)

Greg Belding

View Profile

Greg is a Veteran IT Professional working in the Healthcare field. He enjoys Information Security, creating Information Defensive Strategy, and writing – both as a Cybersecurity Blogger as well as for fun.

Virtualization-based sandbox malware | Infosec (2024)
Top Articles
Richest Countries in the World 2024 - Global Finance Magazine
Revenge — Forgiveness Is The Best Revenge:
Hometown Pizza Sheridan Menu
Chatiw.ib
The Definitive Great Buildings Guide - Forge Of Empires Tips
Nc Maxpreps
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Zachary Zulock Linkedin
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Tracking Your Shipments with Maher Terminal
Conan Exiles Colored Crystal
Gdp E124
Farmer's Almanac 2 Month Free Forecast
Craigslist Portland Oregon Motorcycles
Curry Ford Accident Today
Faurot Field Virtual Seating Chart
1989 Chevy Caprice For Sale Craigslist
All Obituaries | Verkuilen-Van Deurzen Family Funeral Home | Little Chute WI funeral home and cremation
Yugen Manga Jinx Cap 19
Churchill Downs Racing Entries
Himekishi Ga Classmate Raw
Possum Exam Fallout 76
Ezstub Cross Country
Prévisions météo Paris à 15 jours - 1er site météo pour l'île-de-France
Alima Becker
Mkvcinemas Movies Free Download
1987 Monte Carlo Ss For Sale Craigslist
Upstate Ny Craigslist Pets
Greencastle Railcam
Craigslist Com Humboldt
Police Academy Butler Tech
Michael Jordan: A timeline of the NBA legend
Sam's Club Gas Prices Florence Sc
Anguilla Forum Tripadvisor
Low Tide In Twilight Manga Chapter 53
Bob And Jeff's Monticello Fl
Updates on removal of DePaul encampment | Press Releases | News | Newsroom
Craigslist Odessa Midland Texas
Bunkr Public Albums
Mississippi weather man flees studio during tornado - video
Pa Legion Baseball
Emily Browning Fansite
Courses In Touch
Pulaski County Ky Mugshots Busted Newspaper
Nimbleaf Evolution
Dancing Bear - House Party! ID ? Brunette in hardcore action
Turok: Dinosaur Hunter
Upcoming Live Online Auctions - Online Hunting Auctions
Fresno Craglist
Craigslist Indpls Free
Latest Posts
Article information

Author: Duncan Muller

Last Updated:

Views: 6107

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.