2021-06-27 18:24:56 +02:00
title : Detect Virtualbox Driver Installation OR Starting Of VMs
id : bab049ca-7471-4828-9024-38279a4c04da
status : experimental
2021-06-28 08:42:09 +02:00
description : Adversaries can carry out malicious operations using a virtual instance to avoid detection. This rule is built to detect the registration of the Virtualbox driver or start of a Virtualbox VM.
2021-06-27 18:24:56 +02:00
references :
- https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/
- https://threatpost.com/maze-ransomware-ragnar-locker-virtual-machine/159350/
author : Janantha Marasinghe
date : 2020 /09/26
2022-07-14 17:35:50 +01:00
modified : 2022 /07/14
2021-06-27 18:24:56 +02:00
tags :
- attack.defense_evasion
- attack.t1564.006
- attack.t1564
logsource :
category : process_creation
product : windows
detection :
selection_1 :
2022-07-14 17:35:50 +01:00
CommandLine|contains :
2021-06-27 18:24:56 +02:00
- 'VBoxRT.dll,RTR3Init'
- 'VBoxC.dll'
- 'VBoxDrv.sys'
selection_2 :
CommandLine|contains :
- 'startvm'
- 'controlvm'
2022-07-14 17:35:50 +01:00
condition : 1 of selection_*
2021-06-27 18:24:56 +02:00
fields :
- ComputerName
- User
- CommandLine
- ParentCommandLine
falsepositives :
- This may have false positives on hosts where Virtualbox is legitimately being used for operations
2021-06-28 08:42:09 +02:00
level : low