Detectionlowtest
Virtualbox Driver Installation or Starting of VMs
Adversaries can carry out malicious operations using a virtual instance to avoid detection. This rule is built to detect the registration of the Virtualbox driver or start of a Virtualbox VM.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation
Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.
Detection Logic
Detection Logic2 selectors
detection:
selection_1:
CommandLine|contains:
- 'VBoxRT.dll,RTR3Init'
- 'VBoxC.dll'
- 'VBoxDrv.sys'
selection_2:
CommandLine|contains:
- 'startvm'
- 'controlvm'
condition: 1 of selection_*False Positives
This may have false positives on hosts where Virtualbox is legitimately being used for operations
MITRE ATT&CK
Tactics
Techniques
Sub-techniques
Rule Metadata
Rule ID
bab049ca-7471-4828-9024-38279a4c04da
Status
test
Level
low
Type
Detection
Created
Sat Sep 26
Modified
Tue Jul 29
Author
Path
rules/windows/process_creation/proc_creation_win_virtualbox_execution.yml
Raw Tags
attack.defense-evasionattack.t1564.006attack.t1564