title: Detect Virtualbox Driver Installation OR Starting Of VMs id: bab049ca-7471-4828-9024-38279a4c04da status: experimental description: Adversaries can carry out malicious operations using a virtual instance to avoid detection. This rule is built to detect the registration of the Virtualbox driver or start of a Virtualbox VM. references: - https://attack.mitre.org/techniques/T1564/006/ - https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/ - https://threatpost.com/maze-ransomware-ragnar-locker-virtual-machine/159350/ author: Janantha Marasinghe date: 2020/09/26 modified: 2021/06/27 tags: - attack.defense_evasion - attack.t1564.006 - attack.t1564 logsource: category: process_creation product: windows detection: selection_1: CommandLine|contains: - 'VBoxRT.dll,RTR3Init' - 'VBoxC.dll' - 'VBoxDrv.sys' selection_2: CommandLine|contains: - 'startvm' - 'controlvm' condition: selection_1 or selection_2 fields: - ComputerName - User - CommandLine - ParentCommandLine falsepositives: - This may have false positives on hosts where Virtualbox is legitimately being used for operations level: low